DISCOVER. LEARN. SHARE. TechFair 2017: Nov. 15

University of Delaware Information Technologies invites faculty and staff to explore the ways technology can help them, their clients and their students by attending the “Discover. Learn. Share.” Tech Fair on Wednesday, Nov. 15, from 11 a.m. to 2 p.m., in the Multipurpose Rooms of the Trabant University Center. Lunch will be provided.

The annual Tech Fair provides an opportunity for faculty and staff members to familiarize themselves with the technology services offered by the University. Staff members who provide technology support and manage central systems will be available for questions, short discussions and hands-on demonstrations of technology tools.

Read the full article.

UD to celebrate GIS Day on Nov. 16

The University of Delaware IT Client Support Systems, the Library, Museums and Press, and the Geography Department will host GIS Day from 9:30 a.m. to 1 p.m., Thursday, Nov. 16, with a program of lightning talks and poster sessions in the Perkins Student Center Gallery.

The program will begin at 10 a.m., but participants should arrive by 9:30 a.m. to enjoy refreshments and networking opportunities. Those interested in GIS are encouraged to drop by for this event.

Read the full article.

Do you know the basics of computer hygiene?

According to Karl Hassler, director of IT Security and Compliance, “Securing your computer is the single most impactful step you can take toward cyber security. Each of us has a responsibility to ourselves, our families and the campus community to ensure that our computers are secure when we connect.”

According to Hassler, securing a computer is simpler than many people think it is.

Essential security features are built into most computers and only need to be enabled or updated to offer effective protection. Some operating systems even offer security dashboards that allow computer owners to control features like antivirus and firewall protection all in one place.

Read the full article.

Take a bite out of phish!

Around this time last year, the media was publishing stories daily about the hacks that compromised email accounts of John Podesta, Colin Powell, and the Democratic National Committee. Although these incidents parallel one another in many ways, the most fundamental is this: in each case, hackers gained access to email content and accounts through successful phishing attacks.

Read the full article.

Problem with some calls to the UD campus

Today, Monday, October 16, there is a problem with external, incoming phone calls to UD offices when those incoming calls are processed with an automated attendant. If you answer your UD phone and do not hear a caller, ask the caller (whom you cannot hear) to press any number key on their phone’s keypad to activate their end of the call.

Our telephone vendor, WindStream, is working with us to resolve this problem as soon as possible.

What are hackers after?

Whatever their motives, most hackers focus on a few things: exploiting people, stealing data, and compromising systems. Over the past few years, hackers have been focusing less on brute force attacks on servers and security measures; instead, they focus on tricking the humans that use those systems.

“Social engineering,” as the process is called, focuses on deceptive tactics such as impersonation of trustworthy figures, threats of impending consequences or forgery of documents or websites. Through trickery and intimidation, hackers can get their victims to surrender login credentials, personal information or even access to their computers or other devices. From there, hackers can commit identity theft, exploit victims’ computers for ransom, sell data or device access to other criminals, or lock victims out of their accounts and systems.

Read the full article.