Security

Internet Explorer Vulnerability

The Microsoft Internet Explorer web browser is vulnerable to attack as described at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001. There is currently not a fix, and attacks are currently leveraging this vulnerability. We recommend not using Internet Explorer while this issue remains unaddressed.

Chrome and Firefox are available in the Software Center for campus managed PCs: https://support.csuchico.edu/TDClient/1984/Portal/KB/ArticleDet?ID=11735

Safari is installed on all Macs.

Blackboard, Maintenance

Blackboard Extended Downtime

Scheduled Downtime: December 25th 12:01 AM – December 27th 11:59 PM
Services Impacted: Blackboard Learn

Blackboard is moving to the cloud!

Blackboard Learn is scheduled to move to SaaS hosting on December 25-27th. This will require a three-day downtime.

What are the benefits of SaaS? This new delivery model is more flexible than our current hosting plan:

  • Reduced downtime. After this change is complete, we will be able to complete most maintenance updates without ever taking Blackboard offline.
  • Higher quality. Because we will receive continuous software updates, we will always be running the latest bug fixes from Blackboard.
  • Faster access to new features. The SaaS model allows us to deliver new features faster than we have in the past.
  • Peace of mind. Blackboard’s experienced hosting team will be on-duty 24 hours a day, 365 days a year, so that our technicians can focus on other strategic priorities.

More information for students and faculty: Blackboard Migration to SaaS.

Security

NCSAM Week 5: Ransomware

October is National Cybersecurity Awareness Month. For week five CSU, Chico’s Information Security is focusing on Ransomware.

Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of ransomware encrypt files on the system’s hard drive (cryptoviral extortion) while some may simply lock the system and display messages intended to coax the user into paying.

What To Do if You Get Infected with Ransomware

  • Do NOT pay the “ransom” or attempt to contact the ransomware creator.
  • Immediately disconnect your computer from the wired or wireless network, to help avoid your computer from infecting others on the network.
  • Contact ITSS for assistance.

ISEC has recommendations for avoiding ransomware on their web page. Please read this information about ransomware and review all of the Cybersecurity Month content to stay safer and more secure online.

Security

NCSAM Week 4: Malware

October is National Cybersecurity Awareness Month. For week four CSU, Chico’s Information Security is focusing on malware.

Malware: Malware is short for malicious software, it is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Viruses: A computer virus is a form of malicious software that piggy backs onto code in order to spread and reproduce itself. It is deployed by an attacker to damage or take control of a computer.

Trojan: A Trojan is a type of malware that disguises itself as legitimate software to gain access into the users system.

Spyware: Spyware is software that enables a user to obtain convert information about computer activity by transmitting data covertly from their hard drive.

ISEC has recommendations for avoiding all types of malware on their web page. Please read this information about malware and follow along each week of Cybersecurity Month to stay safer and more secure online.