October marks the fourteenth annual National Cyber Security Awareness Month (NCSAM) sponsored by the Department of Homeland Security. The goal of NCSAM is to increase the awareness of the cyber security landscape and to bring awareness to various strategies we all can use to keep our information protected. It is our shared responsibility to protect ourselves, our colleagues, our family members, and K-State’s valuable information and technology resources.
In this video, President Myers weighs in on the importance of cyber security to stay safe online.
At approximately 1:30 p.m. on Tuesday, Sept 19, part of the campus firewall became overloaded, which prevented access to services behind that portion of the firewall. As a result, enterprise systems including the K-State Student Information System (KSIS), the Financial Information System (FIS), Human Resource Information System (HRIS), ImageNow, printing in the computing labs among other applications were unavailable. Moving information (profiles) around to spread the load out allowed services to become available again.
ITS determined the root cause to be related to a test server sending an excess amount of multicast traffic. A known bug in the firewall was unable to process the increased load. We are working on additional mitigation with our vendor partner. ITS apologizes for the inconvenience.
At approximately 10:45 a.m. on Monday, August 28, K-State experienced a power outage in the Data Center, which has now been resolved. Information Technology Services immediately began working with vendors to restore services. Email and K-State Online were restored within an hour. However, enterprise services (KSIS, HRIS, FIS, etc.) on the converged infrastructure took time to restore. ITS apologizes for the inconvenience.
If K-Staters experience any issues with K-State systems, please contact the IT Help Desk 785-532-7722.
On Monday, May 15, Information Technology Services (ITS) scanned the K-State network for the Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017. More than 560 Windows systems did not have the patch, which made them vulnerable to the WannaCry Ransomware. This malware, and its variants, infect systems, encrypt all files, and then require a ransom to “unlock” the files.
ITS and campus system administrators immediately began applying the patch. Within a week, the number of vulnerable systems was reduced to about 80, which were blocked from the K-State network until the patch was applied.
The focus now is on reducing/eliminating unpatched University-owned systems and unpatched systems using the VPN to tunnel into campus. This will minimize the negative impact if a system is brought onto campus, becomes infected, and spreads the malware. ITS will continue to scan the network and block machines.
If you need assistance contact your technical support staff or the IT Help Desk 785-532-7722.
On May 15, initial scanning of the K-State network for the WannaCry Ransomware threat identified over 560 vulnerable Windows systems. In collaboration with system administrators from across campus, there are now fewer than 100 vulnerable systems.
However, K-State continues to be at risk for infection due to vulnerable Windows systems. As of 5:00 p.m. May 25, vulnerable Windows systems were blocked from the K-State network as per University policy.
Faculty, staff, and students who use those systems will NOT be able to access the network (wireless, email, Library databases, HRIS, shared drives, etc.) until their systems are patched and complete a security scan. Guests coming to campus also need to have their computers updated and patched.
Information Technology Services thanks system administrators for their quick response and assistance to protect against this vulnerability. For questions about the vulnerability, contact the IT Help Desk at 785-532-7722.
Hosting guests on campus? Inform them about the ransomware vulnerability, WannaCry, and ask them to have the latest software updates applied on their computers.
K-State continues to monitor the network for the ransomware campaign referred to as WannaCry. Unpatched machines, or computers without the latest security updates, coming onto campus are a risk to our network. This is especially concerning with the number of conferences, camps and orientation occurring on campus during the summer months. Therefore, all computers running the Microsoft Windows operating system must have the latest updates applied.
The specific Microsoft update is MS17-010 SMB vulnerability dated March 14, 2017.
Throughout the summer, the network will be scanned daily. Machines without the updates are subject to being blocked.
Guests can contact the IT Help Desk for assistance at 785-532-7722 or email@example.com.
K-State provides wireless network services for university students, faculty, staff, and guests. The three primary wireless networks are:
KSU Wireless — for current K-State faculty, staff, and students not living in K-State residence halls or Jardine Apartments.
KSU Housing — for current residents of K-State residence halls and Jardine Apartments.
KSU Guest — For temporary visitors to campus. This wireless network has no security.
There has been a surge in the connections to the KSU Guest wireless network causing an overload with that connection. Your devices are probably automatically connecting to KSU Guest without you realizing it.
How can you help?
Configure your device to forget the KSU Guest wireless network. After you forget the KSU Guest wireless network, your device will not automatically connect to it.
The first-ever Data Science Hack event at K-State, “Data Science for Social Good,” is Friday-Sunday, Nov. 11-13, at the Engineering Building on the Manhattan campus. The deadline for registering will be 11:59 p.m. on Nov. 5, 2016. The event is free.