Security Tips: Cyber Shopping Safely

by in , , , ,

The holiday season is here, and so many deals are appearing online. Keeping your data secure is a must, so to stay safe with your online shopping check out these quick tips:

  • Email Ads: The latest deals will start to appear in your inbox. Make sure the sender is who they say they are before clicking.
  • Verify the Site: When trying to find that perfect gift, you never know what online shop you may stumble into. Before signing up and checking out your cart, make sure the store is legitimate and trusted by others.
  • Securely Connect: It is always a good idea to double-check the website URL beginning with “https://” to better secure your information.
  • Beware Scalped Goods: Don’t buy outside of a trusted retail seller to ensure you’re paying the right price for trendy items.
With these tips in mind, you’ll be sure to get just what you were looking for without losing your data. Find more holiday shopping security tips at https://www.staysafeonline.org/articles/safe-online-holiday-shopping.

For more information, contact CSUCI's Information Security Team at infosec@csuci.edu or visit the ITS Information Security website.

Introducing Important Delegation of Authority (DOA) Resources

by in , ,

Financial Services in partnership with IT Services would like to share two very important resources. The first is the Delegation of Authority webpage. The second is the new DOA Module in CI Financials (CFS).

Delegation of Authority Webpage

The new Delegation of Authority webpage will help educate campus partners on our new DOA structure/process. It covers:  

  1. Delegate responsibilities
  2. History behind the creation of CSU systemwide DOA process
  3. Delegate level definitions and guidelines
  4. Types of transactions that fall under the DOA
  5. Link to the DOA Form & workflow in Adobe Sign
  6. How to query DOA details in CI Financials
  7. Link to view approved DOA Forms
  8. Points of contact for DOA support

DOA Module in CI Financials (CFS)

The new DOA Module in CI Financials (CFS) takes the guesswork out of finding authorized signers. A simple query by Department ID and/or Fund Code may be used to return a list of authorized approvers/signers. 

And this one central repository of campus approvers may also be used to look-up the name of a signature to confirm its authority is valid. Campus partners who do not currently have access to CI Financials (CFS), but who now have a business need to be able to perform queries within the DOA Module are encouraged to speak with their management and visit the CI Financials Support page to begin the process of requesting access to CI Financials (CFS).


Upcoming Windows 11 Upgrade

by in , , , ,

We would like to inform you about an upcoming operating system upgrade for Windows campus computers. In the days following the end of our Spring term, the ITS Department will be rolling out Windows 11 to enhance the computing experience across the campus.

Windows 11 Logo

Please note that while we strive to make this transition as smooth as possible, some computers may not be compatible with Windows 11. If your computer falls into this category, you should have received a notification already.

As part of this upgrade, it's crucial to emphasize the importance of backing up your data. We strongly recommend using your campus OneDrive account for this purpose. OneDrive provides a secure and easily accessible cloud storage solution, ensuring that your important files are protected during the upgrade process.

The upgrade process will be automatic, and we anticipate a brief downtime during the installation. The estimated downtime is approximately 30 minutes; however, it could take much longer depending on the specific computer as the system undergoes the necessary updates. We understand the importance of your work, and we appreciate your patience during this period. Your computer will provide you with the option to choose when to restart and apply the update, allowing you to schedule the upgrade at a time that is convenient for you and minimizing any potential disruption to your work.

We understand that change can be challenging, but Microsoft has announced the End of Life for Windows 10 next year, and we believe that Windows 11 will bring improved functionality and enhanced security to your computing experience.

If you encounter any questions or problems with the upgrade, please contact the ITS Help Desk for assistance at (805)-437-8552 or by submitting an ITS Service Request.

Thank you for your cooperation as we work towards providing you with the latest and most secure computing environment.

(Re)Introducing the ITS Help Desk

by in , , , ,

CSUCI IT Services is pleased to announce that we will be re-opening our face-to-face customer support space in Broome Library 1350 on March 25th, 2024. Formerly known as the Solution Center Service Desk, the ITS Help Desk has been renamed to emphasize our dedication to providing prompt, efficient, and courteous assistance with IT-related matters to our campus community.

We cordially invite the campus community to the grand [re]opening of the ITS Help Desk on March 25th at 9:00 AM in Broome Library 1350. Learn about the services offered at the ITS Help Desk, mingle with ITS staff, and enjoy light refreshments. 

For further information regarding the opening of the ITS Help Desk, please visit the CSUCI News Center - Solution Center reintroduced as ITS Help Desk.


Tips to Avoid Tax Season Scams

by in , , ,

Tax time

As you prepare to do your taxes this season, be on the lookout for these potential signs of tax fraud: 

  • First and foremost, be wary of unsolicited messages claiming to be from the IRS or any tax authority. These entities will never contact you by email, text message, or social media to request personal or financial information. 
  • Emails containing documents about tax law changes are another avenue for scammers to get malicious files into your computer.
  • The promise of unusually large refunds, which scammers use to lure unsuspecting taxpayers into sharing sensitive information. 
  • If using one, ensure your tax preparer is reputable and has appropriate credentials. Always review your tax return carefully before submitting and avoid signing blank forms. 

Lastly, safeguard your Social Security number and personal information, as these are key targets for identity thieves. By staying informed and vigilant, you can keep your valuables safe and out of the hands of criminals. 

Read more about this here: https://www.irs.gov/newsroom/irs-security-summit-partners-warn-of-surge-in-new-client-scams-aimed-at-tax-pros-as-2024-filing-season-approaches.

For more information, contact CSUCI's Information Security Team at infosec@csuci.edu or visit the Information Security website.


Using End-of-Life (EOL) Computer Equipment Can be a Substantial Cyberthreat

by in , , , ,

In a recent cybersecurity triumph, the U.S. government successfully thwarted a sophisticated botnet linked to the People's Republic of China. This botnet was allegedly utilized to conceal hacking activities targeted at critical infrastructure, posing a potential threat to national security.

End of Life Computer Equipment is a Cyberthreat

The nation-state hackers used comprised routers from Cisco, NetGear, and other routers that were vulnerable because they had reached “end of life” status; that is, they were no longer supported through their manufacturer’s security patches or other software updates.

The Department of Justice spearheaded a coordinated effort to dismantle the botnet, severing the connection between compromised devices and the central server. This strategic move neutralized an immediate threat and signaled the United States' commitment to defend against cyber threats.

Critical infrastructure, including power grids and communication networks, is increasingly vulnerable to cyber-attacks. The disruption of this botnet is a pivotal step in protecting these essential systems and attributing cyber-attacks to their perpetrators. The incident also emphasizes the need for international cooperation in addressing evolving cyber threats.

Your home network and EOL devices can lead to a cyber-attack. Ensuring devices are updated and replaced in a timely manner is crucial to protecting yourself from an attack like this. 

Source: https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical


Information Security Scholarship Opportunities - Applications Begin January 15, 2024

by in , , , ,

CSUCI Information Technology Services would like to bring attention to a great opportunity for students looking for scholarship opportunities in the field of Information Security.

ISC2 Scholarships

Educating Future Information Security Professionals

The International Information System Security Certification Consortium (ISC2) and its Center for Cyber Safety and Education are deeply committed to encouraging and supporting students pursuing a degree focusing on cybersecurity, information assurance, or similar fields. The scholarships, sponsored by ISC2, support students globally. Efforts like these can lead students to long-term career success in a rewarding and critically important field. The scholarships are part of an effort to bridge the cybersecurity workforce gap—which stands at 3.4 million needed professionals—by providing future cybersecurity professionals across the globe with scholarships to prepare them for a rewarding career in this important field.  

Find more information about all the scholarships at https://www.iamcybersafe.org/s/scholarships.