Month: November 2021

They say “one bad Apple can spoil the whole”…..

In case you missed this notice ITCS has been alerted that multiple vulnerabilities have been discovered in Apple products.  Per ITCS, depending on the security settings associated with the application that was exploited, an attacker could install programs, or view, change, or delete data.

We recommend the following actions be taken:

  • Apply appropriate patches provided by Apple.
  • Run all software as a nonprivileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Do not download, accept, or execute files from untrusted and unknown sources.
  • Do not visit untrusted websites or follow links provided by untrusted or unknown sources.

Systems Affected:

  • iOS and iPadOS prior to 15.1
  • iOS and iPadOS prior to 14.8.1
  • macOS Monterey prior to 12.0.1
  • macOS Big Sur prior to 11.6.1
  • macOS Catalina prior to security update 2021-007
  • watchOS prior to 8.1
  • tvOS prior to 15.1

To view more click HERE.

Ready, Set, Go…. Panopto

Panopto is well on its way and the CAHS couldn’t be more excited.  As we are preparing for the implementation.  There are few updates that you need to make a note of.

  • According to ITCS our ability to record in Mediasite will end April 27, 2022.
  • Spring Early Adopter Group – Hopefully you had to opportunity to register for this opportunity.
  • Campus-wide training will begin in February.

If you would like to learn more about Panopto please visit the following links below.

https://itcs.ecu.edu/teaching-learning/november-2021/

https://howtovideos.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=f2d74e7b-4c52-444a-82f1-a993016bf2b7

https://howtovideos.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=7dec6358-93fc-4db0-966a-a9ee014b1251

Wait… no don’t leave

WHAT IS CYBERSECURITY?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.  Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information or interrupting normal business processes.

Examples:

  • Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.  The aim is to steal sensitive data like credit card numbers and login information.  This is the most common type of cyber attack.
  • Ransomware is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
  • Intellectual property violations involve robbing people or companies of their ideas, inventions, and creative expressions—known as “intellectual property”. There are four types of intellectual property (IP) rights: patents, trademarks, copyrights, and trade secrets.
  • Social engineering attacks target people with legitimate-looking emails and social media messages that trick users into providing confidential data, such as credit card number, social security number, account number, or password.
  • Harmful web robots (or ‘bots’ for short) are automated programs that are placed across the internet to do various tasks.

For more in depth information on cybersecurity, check out the links below.

https://reciprocity.com/resources/cybersecurity-challenges-facing-higher-education/

https://itcs.ecu.edu/security-compliance/csam-thats-a-wrap/