School navigation

Information Technology

Information Security News


October is National Cyber Security Awareness Month!

[October 3, 2017]

 

With the increasing numbers of data breaches, your personal information is at risk.  

Knowing how to protect yourself will help you stay safe online.

Learn about these important tips on the IT Security NCSAM website.

  • Lock Down Your Login - passwords alone are no longer good enough.
  • Own Your Online Presence - personal information is like money, value and protect it.
  • Keep a Clean Machine - keep all everything (all the things) up to date.
  • When in Doubt, Throw it Out - don’t fall for phishes and remove unused software.

Stay Safe Online!

 

More info on the Information Security website.

 

_____________________________________

The Equifax Security Breach

[September 8, 2017]

 

Yesterday Equifax, one of the top three credit reporting agencies, announced they suffered a major security breach. This breach resulted in the compromise of 143 million consumers’ sensitive information including names, Social Security numbers, driver’s license numbers, birth dates, and addresses.  The criminals gained access through a web application vulnerability and were detected on July 29.   

You can check to see if you are impacted.  This can be done at: https://www.equifaxsecurity2017.com/potential-impact/  

If your account was impacted, Equifax is providing a one year credit monitoring service.  You can enroll for this at: https://www.equifaxsecurity2017.com/enroll/. It has been noted that enrolling in this service may prevent you from participating in a class action lawsuit.

Another step you can take is to freeze your credit with all credit reporting agencies.  Putting a security freeze on your credit report means that lenders will be unable to check your credit without additional steps being taken on your part to suspend the freeze.  While this increases security, it may also delay legitimate requests.  In order to place a security freeze, you must visit each credit reporting agency:  

  1. Experian - https://www.experian.com/freeze/center.html

  2. TransUnion - https://www.transunion.com/credit-freeze/place-credit-freeze

  3. Equifax - https://help.equifax.com/s/article/ka137000000DSDjAAO/How-do-I-place-a-security-
    freeze-on-my-Equifax-credit-file

It is also a good practice to proactively create a Social Security Administration account.  Since the personal information stolen in this breach, and often targeted, is used to steal your identity by creating a Social Security account, it is best to have one already created.  To do so:  https://www.ssa.gov/myaccount/

Another good practice is to check your credit report annually.  While this, and active credit monitoring, will not prevent identify theft from occurring, it can provide some forewarning to identify an issue as early as possible.

And, as always, be watchful for phishing emails that will take advantage of this data breach and attempt to obtain your account information.

If you are interested in learning more about the Equifax security breach, below are some related articles:

 

___________________________________________________________________ 

Special Alert: Ransomware is on the Rise

[July 27, 2016]

Last Friday, May 12, the WannaCry ransomware started making its way around the internet, infecting tens of thousands of computers by exploiting a vulnerability in Windows that was patched in March (MS17-010).  Several large victims made the news, such as UK’s National Health Service (NHS).  The exploit, ETERNALBLUE, was developed by the NSA, but was part of the leak done a few weeks ago by the Shadow Brokers hacking group.
The WannaCry ransomware will encrypt files and demand about $300 to start, increasing to $600 in 3 days.   It will also install a backdoor, DoublePulsar, another NSA leaked tool.  Since these tools are now publicly available, both the good and bad guys have access to them, which means we will see more attacks in the future.
Your best defense in this case is to ensure your system is patched with all critical and recommended Windows updates.  Symantec Endpoint Protection was able to detect the WannaCry infection prior to it being released, however it would have had a different name and you also had to be running Network Threat Protection.   The latest versions have this feature enabled, so running the latest version is always the best course of action.  (available from the website for staff and students)

 

___________________________________________________________________ 

 

 

Tax Identity Theft Awareness Week 

What is Tax Identity Theft? 

 

Tax-Related Identity Theft Information 

Do you know the warning signs that an identity thief is using your Social Security number?

What can you do if you’re a victim of Tax Identity Theft?

Visit IdentityTheft.gov

Get the federal government’s one-stop resource to help you report and recover from identity theft. Get step-by-step advice, sample letters, and other helpful resources. Recovering from identity theft is easier with a plan and identitytheft.gov can help you.

 

 

 

January 28th is Data Privacy Day

Check your privacy settings for all your services

 

 

 

 

 

___________________________________________________________________ 

 

October: Security is Everyone’s Responsibility

[October 11, 2016]

October is National Cyber Awareness Month (NCSAM), a time to remind users to exercise safe online behavior and to provide tips on how to do so.

The increase of mobile device usage in our daily lives, from smartphones and tablets to iPads and wearables, allowing 24/7 access to our personal data, increases our security risks.  Now more than ever, we must exercise caution and learn how to protect ourselves and our information.

Visit the Information Security Awareness site for lots of security tips, guides, and resources to protect yourself.

(https://www.lclark.edu/information_technology/security/awareness/)

 

Some quick links to get you started:

General Information Security

Mobile Security

Google Email Security

Browser updates

Phishing

Encrypting files

Traveling

- Ransomware

 

Be safe online!

 

___________________________________________________________________ 

 

Ransomware on the Rise 

[July 21, 2016]

 

Ransomware is a serious threat to the integrity of our organization’s data and targeted attacks have increased 300% since 2015. (source: FBI)

Ransomware is a PC or Mac-based malicious piece of software cyber actors use to deny access to systems or data until the ransom is paid. After the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the system or encrypted data remains unavailable, or data may be deleted. 

Ransomware infects PC or Mac systems through phishing emails, unpatched programs, compromised websites, online advertising and free software downloads.

Ransomware uses RSA 2048 encryption, which would take an average desktop computer 5.4 quadrillion years to crack. (source: Ransomware Hostage Rescue Manual, Adam Alessandrini.)

Ransomware demands payment in the form of bitcoins (BTC), which are an anonymous form of payment exchange and are untraceable.  Bitcoins are used for legitimate purposes, however they have also made an increase in ransomware payment possible.  There is no guarantee that you will be able to decrypt your files after you pay and there have been cases where payment was given and no key to decrypt the data was received.

Symptoms

  • You cannot open your files and the files have an abnormal extension (ie: locky).
  • You receive an alarming message with instruction on how to pay to unlock your files.
  • The ransomware program threatens you with a countdown until the ransom increases or you will not be able to decrypt your files.
  • The ransomware program window cannot be closed.
  • You have files named ‘HOW TO DECRYPT FILES.TXT or DECRYPT_INSTRUCTIONS.HTML’.

Response

  1. Disconnect everything (turn off wifi, bluetooth, unplug from the network)
  2. Determine scope of infection (check USB storage devices, mapped network drives, cloud based storage)
  3. Determine ransomware strain 
  4. Remove ransomware from your infected system
  5. Restore from a recent backup 
  6. Try to decrypt your files using a 3rd party decryptor (very unlikely you will succeed)
  7. Do nothing (lose access to your data)
  8. Pay the ransom (no guarantee you will be able to decrypt your data)
  9. Protect your self in the future

How to protect yourself

  • Use anti-virus/malware software
  • Keep all your software patched, including third party plug-ins used for websites
  • Enable your system’s firewall
  • Do not download free or un-signed (untrusted) software
  • Do not open attachments or visit links in emails unless you explicitly requested them; visit the website yourself
  • Do not respond to phishing emails, which pretend to be legitimate sources and will either send you to another website to gather your information or infect your system
  • Backup your data often so you can recover your files

Other Information on Ransomware:

  • US-CERT Alert: Ransomware and Recent Variants (https://www.us-cert.gov/ncas/alerts/TA16-091A)
  • CSO Online: How to Prepare for and Prevent Ransomware Attacks (http://www.csoonline.com/article/3088066/backup-recovery/how-to-prepare-for-and-prevent-ransomware-attacks.html)
  • Ransomware Hostage Rescue Manual (http://resources.idgenterprise.com/original/AST-0148364_Ransomware-Hostage-Rescue-Manual.pdf)
  • CSO Online: Tricks that Ransomware Uses to Fool You
  • University pays $16,000 to recover crucial data held hostage (http://arstechnica.com/security/2016/06/university-pays-almost-16000-to-recover-crucial-data-held-hostage/)

L&C Information Security Awareness:

https://www.lclark.edu/information_technology/security/awareness/

 

___________________________________________________________________ 

Bank of America Alert:  Increase in Payment Fraud

[July 21, 2016]

Payment fraud results in illegal activity that takes place when fraudulent transactions are performed under a payment card or account and occurs as a result of account takeover.

Your account may get compromised through targeted phishing emails, ones that look very convincing such as another bank or an executive you know, but instead direct you to a malicious website that steals your account credentials or contains attachments that when opened will infect your computer.

How to Stay Safe:

  • Be wary of any urgent or confidential requests.  If something looks fishy to you, it probably is.
  • Validate by phone any beneficiary or address changes from vendors.
  • Alert your back so proper action is taken to stop the transaction or prevent more from occurring, such as wire transfers.

L&C Information Security Awareness:

https://www.lclark.edu/information_technology/security/awareness/

 

___________________________________________________________________

Critical Patches for Symantec Endpoint Protection

[July 14, 2016]


Symantec released updates for multiple critical vulnerabilities in their Endpoint Protection product affecting both Mac and Windows versions.

IT applied the updates to all managed systems.

Ensure your Symantec Product is up to date!

 

Get the latest Symantec Endpoint now!

https://www.lclark.edu/information_technology/security/symantec/

Reminder: Anti-virus software is required in order to access the LC network from dorms, wireless, and other public locations.

 

_____________________________________

 

Increase in Phishing Emails

[March 7, 2016]

Recently our campus has seen some phishing emails, messages designed to trick you into giving up sensitive information (ie: login and password) by looking like legitimate messages from known sources (ie: L&C College).

Please remember to always exercise caution when receiving such messages.  Even if you think it is legitimate, try to go to the page of the service directly instead of clicking on the link provided to you in the email message. 

Furthermore, the IRS has seen a significant increase (~400%) in phishing and malware incidents this tax season, including a sophisticated message involving W-2s.  The IRS, state tax agencies and the tax industry have now engaged in a public awareness campaign: Taxes. Security. Together.

IRS Security Awareness:

https://www.irs.gov/Individuals/Taxes-Security-Together

https://www.irs.gov/uac/Newsroom/IRS-Alerts-Payroll-and-HR-Professionals-to-Phishing-Scheme-Involving-W2s

Lewis & Clark Information Security Awareness:

https://www.lclark.edu/information_technology/security/awareness/

_____________________________________

 

President Signs Cybersecurity Executive Orders

The Executive Orders created two new entities, a Commission on Enhancing National Cybersecurity and a Federal Privacy Council. The Commission will bring together leaders from the business, technology, national security, and law enforcement communities. They will be responsible for making “recommendations to strengthen cybersecurity in both the public and private sectors while protecting privacy, ensuring public safety and economic and national security, fostering discovery and development of new technical solutions, and bolstering partnerships between Federal, State, and local government and the private sector in the development, promotion, and use of cybersecurity technologies, policies, and best practices.”

The recommendations are intended to address policies that can be implemented within the next decade. A final report is due to the president by December 1, 2016.

The Federal Privacy Council will be composed of chief privacy officers from 25 federal agencies. The Council will serve as a vehicle for federal CPOs to collaborate on best practices for protecting the data about citizens that the federal government collects and maintains.

The two Orders were released along side the administration’s proposed Fiscal Year 2017 budget. This year the administration included $19 billion for information technology upgrades and other cyber initiatives — a 35% increase from 2016 spending levels.

The President also intends to create a new Chief Information Security Officer position for the federal government. This individual will oversee government-wide efforts to modernize cybersecurity and related information technology.

Source: http://er.educause.edu/blogs/2016/2/president-signs-cybersecurity-executive-orders