Cyber Security Awareness Month

Information Security

Mission Statement

The Information Security Office is committed to lowering the risk profile of the University’s electronic information by implementing industry best practices to protect the confidentiality, integrity, and availability of student, faculty, and staff information. We uphold the University’s compliance obligations by developing information security policies, providing security awareness training, and overseeing the implementation of strategic information security initiatives.

Scam of the Week

Don’t Wish for This Smish

In a recent text message phishing (smishing) scam, cybercriminals send you a text that appears to be from the U.S. Postal Service (USPS). The text says that you have a package at the post office that cannot be delivered due to an incomplete address. The message contains a PDF file and directs you to open it to complete your address. 

You are then directed to click a button in the PDF file, which takes you to what appears to be a USPS web page. The page instructs you to enter your address, personal data, and credit card number so the USPS can attempt to redeliver your package. The catch is there never was a package. The USPS page is actually fake and controlled by cybercriminals. If you enter any information here, cybercriminals will be able to steal it immediately!

Follow these tips to avoid falling victim to a smishing scam: 

  • This smishing scam claims to be from the USPS, but be wary of any unsolicited text messages from unknown numbers. If you aren’t sure if a message is legitimate, delete or report it.
  • Don't reply to unexpected text messages, even to say "STOP" or "unsubscribe." If you have any questions regarding delivery, contact your local post office directly.
  • Never click on any attachments or links from suspicious text messages or emails

View More

Time It Takes a Hacker to Brute Force Your Password in 2023

Number of Characters Number Only Lowercase Letters Upper and Lower Case Letters Numbers, Upper and Lowercase Letters Numbers, Upper and Lowercase Letters, Symbols
4 Instantly Instantly Instantly Instantly Instantly
5 Instantly Instantly Instantly Instantly Instantly
6 Instantly Instantly Instantly Instantly Instantly
7 Instantly Instantly Instantly Instantly Instantly
8 Instantly Instantly Instantly Instantly 1 sec
9 Instantly Instantly 4 secs 21 secs 1 min
10 Instantly Instantly 4 mins 22 mins 1 hour
11 Instantly 6 secs 3 hours 22 hours 4 days
12 Instantly 2 mins 7 days 2 months 8 months
13 Instantly 1 hour 12 months 10 years 47 years
14 Instantly 1 day 52 years 608 years 3k years
15 2 secs 4 weeks 2k years 37k years 232k years
16 15 secs 2 years 140k years 2m years 16m years
17 3 mins 56 years 7m years 144m years 1bn years
18 26 mins 1k years 378m years 8bn years 79bn years

 

  Latest News
Phishing Click Rates Triple in 2024
Phishing Click Rates Triple in 2024
Wednesday - January 8, 2025
The rate at which enterprise users clicked on phishing lures nearly trebled in 2024, according to new research by Netskope.
Read more
The Most Dangerous Pop Culture Passwords in 2024
The Most Dangerous Pop Culture Passwords in 2024
Monday - June 3, 2024
In a world where over 2,200 cyberattacks are made per day, passwords are an internet user's baseline defense against digital ne'er-do-wells.
Read more
FBI Fraud Alert
FBI Fraud Alert
Tuesday - March 19, 2024
If you or a loved one were solicited through a computer pop-up, social media site, dating site, text, email, or phone call by someone you have never met, and answer "YES" to one of the following questions, you may have been targeted by a SCAM.
Read more

Cyber Security Alerts

What is being exploited?
Vulnerability in Windows CryptoAPI that allows malicious executables using a spoofed code-signing certificate to appear as if it was from a trusted source.

What does this affect?
Attackers can conduct man-in-the-middle attacks and decrypt confidential information on user connections to spoofed software that appears legitimate.

Which Operating Systems does this affect?
Windows 10, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0601

What is being exploited?
Vulnerability in Windows Remote Desktop Gateway (RD Gateway) that allows specially crafted requests to execute arbitrary code on the target system.

What does this affect?
Attackers can gain access to the target system with full user rights that would allow them to install programs; view, change, or delete data; or create new users.

Which Operating Systems does this affect?
Windows Server 2012, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0609 & CVE-2020-0610

What is being exploited?
Vulnerability in Windows Remote Desktop Client that allows the server to execute arbitrary code on the target system after an unsuspecting user connects to it.

What does this affect?
Attackers can trick the user into connecting to a compromised server and gain access to the target system with full user rights that would allow them to install programs; view, change, or delete data; or create new users.

Which Operating Systems does this affect?
Windows 7, Windows 8, Windows 10, Windows RT, Windows Server 2008, Windows Server 2012, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0611

Windows 10 & Windows Server 2016 and newer
1. Search: Check for Updates

2. Click “Check for Updates” then install all updates

Windows 8 and older & Windows Server 2012 and older
1. Navigate: Control Panel > System and Security > Windows Update

2. Click “Check for Updates” then install all updates