11/19/21 – A phishing message is circulating that targets students. The sender impersonates a UConn person and unit and attempts to trick the reader into clicking the link (cli. If you click the link, you are taken to a fake Office 365 login page and asked to enter your UConn credentials. Continue reading
Author: Mattingly, Ashley
Beware of Gift Card Scams
11/8/2021 – UConn IT Security is reporting a spike in the number of gift card scam messages. In this type of targeted message, the senders impersonate someone that you know, like a supervisor or department head, and they ask you to buy gift cards on their behalf. Do not respond, and do not buy gift cards.
University IT Security Policies
Revised Policies
Acceptable Use: Faculty, staff, and students should only use university IT equipment, systems, and services for university-related work and not for commercial or illegal activities. Individuals have a responsibility to protect their identity, data, and IT resources.
The sharing of accounts and/or passwords is disallowed. Systems should be properly maintained and patched to ensure security.
Data Classification Policy: Know the classification and requirements for handling various data types. Where appropriate, store your data on university managed databases and file storage systems. Protected and confidential data require additional levels of protection.
Data Roles and Responsibilities Policy: The roles and responsibilities of data stewards, data administrators, and data users are defined to ensure data is properly protected, used, and managed throughout its lifecycle.
Risk Management: Department and system owners are responsible for conducting a regular and ongoing risk assessment of the technology platforms they oversee.
Security Awareness Training Policy: Security awareness training is available to the UConn community, and the Information Security Office may mandate training for those who have access to confidential or protected information.
Use of Social Security Numbers: As systems are updated and replaced, Social Security Numbers should be used only as required.
New Policies
System and Application Security: Individuals responsible for operating or overseeing any University system or application are responsible for proper maintenance and oversight of systems and applications used by university constituents.
Mobile and Remote Device Security: Mobile or remote devices used to access any non-public IT resources owned or managed by the University must meet security requirements designed to reduce risk to University data and information systems.
Firewall Policy: Firewalls must be configured to maximize their protection and detection capabilities.
Updated University IT Security Policies
Regular review and revision of policies is part of evolving a mature information security program that protects systems and data for both our community and the institution. Continue reading
Cybersecurity Awareness Month
ITS is kicking off a communication series for Cybersecurity Awareness Month. Continue reading
Adding Cisco Umbrella to Administrative Computers
Cisco Umbrella is a Domain Name System (DNS) filtering product that guards against threats on the internet, such as malware, phishing, and ransomware. Continue reading
Cybersecurity Review
Substantive elements of the University’s information technology cybersecurity infrastructure will be reviewed by Deloitte, an external agency. Continue reading
Information Security Policies
The Information Security Office has reviewed and substantively revised information security policies, guidelines, and standards. Continue reading
Additional Protection from Web-based Threats
ITS will be implementing a Domain Name System (DNS) filtering product, Cisco Umbrella, to enhance protection against web-based threats. Continue reading
Results of Simulated Phishing Campaign
The ITS Security Office recently initiated a simulated phishing campaign at the request of the Joint Audit and Compliance Committee (JACC). UConn faculty and staff received test messages this past October that mimicked a common attack. Continue reading