Campus Phone System Upgrade Project

by in , , , ,

Smarter Communication is Coming

The campus phone system is undergoing a major upgrade to support more modern and flexible communication while saving the campus money. The current system will reach its end of life in August 2025, making this transition both necessary and timely. The new platform offers improved features and better integration with existing campus tools.

Why Is This Upgrade Happening?

  • Unified Experience: The new system integrates with commonly used productivity tools such as email, calendar, and messaging platforms.
  • Adaptable Use: Designed to support on-campus, hybrid, and remote users.
  • Efficiency: Reduces the need for complex phone infrastructure and lowers maintenance costs.
  • Safety Improvements: Fully supports enhanced emergency calling features to help protect the campus community.

Project Timeline

  • Project Completion: May 5, 2026

What’s Included

  • Transition of all employee and departmental phone lines
  • Number porting to the new platform
  • Replacement of phones in classrooms, public areas, and elevators
  • Training and support for users
  • Integration with emergency calling services

What’s Not Included

  • Personal mobile phone applications
  • Non-campus-managed third-party systems

What to Expect

  • Timely updates on migration schedules
  • Access to training sessions and resources
  • Full support from the campus IT team throughout the transition

Beware of TOAD Attacks

by in , , ,

There has been a recent rise in the number of phishing attacks that incorporate a direct phone call with the target. This technique, known as Telephone-Oriented Attack Delivery (TOAD) often starts by sending the user a phishing email urging them to call a phone number. During the call, attackers pretend to be a legitimate customer service representative and attempt to trick their target into downloading malware or disclosing sensitive information. 

Bad actor performing a TOAD attack

Follow these tips to not fall victim to a TOAD attack:

  • Always verify contact information by cross-referencing the phone number or email address in the message with the official contact details listed on the organization’s website.
  • Never share sensitive information over the phone, including passwords, PINs, or multi-factor authentication (MFA) codes.
  • Be wary of urgent language; TOAD scammers use urgency or threats to push you into acting fast.


Information Security Tips - Security While Gaming

by in , , , ,

Playing video games is a fun way to connect and interact with others online. However, the hobby does come with some security risks. Keep these tips in mind to keep your information safe.



1. Make sure the software you download comes from a reputable source. For example, a trusted storefront.

2. Use strong, unique passwords on all your accounts: If a threat actor gets control over one of your accounts, having unique passwords prevents them from getting into all your other accounts. Using a password manager makes the task of remembering all those unique passwords much simpler.

3. Enable Multi-factor Authentication if possible: This provides an additional layer of account security to ensure your information does not fall into the wrong hands.

4. Be wary of suspicious messages delivered to you over chat services. Never provide your account details to anyone.

By following these simple but important tips, you can enjoy gaming while keeping your personal information secure. Staying vigilant about what you download, using strong passwords, enabling extra security measures, and being cautious with in-game communication can go a long way in protecting your digital life and ensuring that you stay safe while enjoying your hobby!

May | CSUCI Info Sec Partners with Oxnard Union High School District to Support AP Computer Science Pathways

by in , , , ,

In collaboration with the Oxnard Union High School District, CSUCI's Info Sec Team, helped on the development of pathways for the AP Computer Science classes. 

In collaboration with the Oxnard USD, CSUCI's Info Sec Team, helped on the development of pathways for the AP Computer Science classes.

As a local college colleague with involvement in the Ventura County schools' development of educational pathways, CSUCI’s Info Sec Team was invited to a meeting at the Oxnard Union High School District offices to provide input, along with local industry, collegiate, and other stakeholders, for Oxnard Unified School teachers to begin their curriculum development. 

The district offers a Software Development Pathway, consisting of AP Computer Science Principles, followed by AP Computer Science A (Java Coding).  The purpose of the meeting was to discuss new courses that incorporate more real-world learning, including possible units on app development, machine learning and AI, data, cybersecurity, and multimedia computer skills.


AI: A Day of Discovery - 4/23

by in , , , ,

We would like to extend this invitation for you to join us for AI: A Day of Discovery on Wednesday, April 23rd from 10:30 AM to 12:00 PM in Broome Library 2330. Explore practical applications of AI and learn how it can improve your workflow and boost efficiency! Join us to uncover the potential of AI in optimizing your work processes!


AI: A Day of Discovery Flier

Click the image above to RSVP!



Security Tips: Cyber Shopping Safely

by in , , , ,

The holiday season is here, and so many deals are appearing online. Keeping your data secure is a must, so to stay safe with your online shopping check out these quick tips:

  • Email Ads: The latest deals will start to appear in your inbox. Make sure the sender is who they say they are before clicking.
  • Verify the Site: When trying to find that perfect gift, you never know what online shop you may stumble into. Before signing up and checking out your cart, make sure the store is legitimate and trusted by others.
  • Securely Connect: It is always a good idea to double-check the website URL beginning with “https://” to better secure your information.
  • Beware Scalped Goods: Don’t buy outside of a trusted retail seller to ensure you’re paying the right price for trendy items.
With these tips in mind, you’ll be sure to get just what you were looking for without losing your data. Find more holiday shopping security tips at https://www.staysafeonline.org/articles/safe-online-holiday-shopping.

For more information, contact CSUCI's Information Security Team at infosec@csuci.edu or visit the ITS Information Security website.

Introducing Important Delegation of Authority (DOA) Resources

by in , ,

Financial Services in partnership with IT Services would like to share two very important resources. The first is the Delegation of Authority webpage. The second is the new DOA Module in CI Financials (CFS).

Delegation of Authority Webpage

The new Delegation of Authority webpage will help educate campus partners on our new DOA structure/process. It covers:  

  1. Delegate responsibilities
  2. History behind the creation of CSU systemwide DOA process
  3. Delegate level definitions and guidelines
  4. Types of transactions that fall under the DOA
  5. Link to the DOA Form & workflow in Adobe Sign
  6. How to query DOA details in CI Financials
  7. Link to view approved DOA Forms
  8. Points of contact for DOA support

DOA Module in CI Financials (CFS)

The new DOA Module in CI Financials (CFS) takes the guesswork out of finding authorized signers. A simple query by Department ID and/or Fund Code may be used to return a list of authorized approvers/signers. 

And this one central repository of campus approvers may also be used to look-up the name of a signature to confirm its authority is valid. Campus partners who do not currently have access to CI Financials (CFS), but who now have a business need to be able to perform queries within the DOA Module are encouraged to speak with their management and visit the CI Financials Support page to begin the process of requesting access to CI Financials (CFS).