Information Technology Services is addressing the vulnerability, referred to as KRACK (Key Reinstallation Attack). The vulnerability affects WiFi connectivity using the WPA2 encryption method. The hacker could use this vulnerability on an open, unencrypted network to retrieve confidential information including credit card information, social security numbers, bank account information, etc.
The K-State current Aruba infrastructure already has the protection in place for all of the vulnerabilities except for 802.11R, which is not enabled on our controllers at this time.
While protections are in place, K-Staters need to ensure that their devices (smartphones, laptops, etc.) have all the current patches and update as patches become available. This vulnerability also underscores the need for K-Staters to use the authenticated networks on campus including KSU Wireless, KSU Housing and Eduroam. When connecting from outside our network, K-Staters need to use the virtual private network (VPN).
The open KSU Guest wireless is unencrypted and should be avoided. The same is true when using open wireless networks at local restaurants, fast food operations, hotels, when shopping etc.
For assistance, contact the IT Help Desk at 785-532-7722.
The K-State Credit Union is hosting a free community shred day 9-11 a.m, Saturday, Oct. 7, at 601 McCall Rd (East Branch).
Take advantage of this free service and safely dispose of your sensitive paper documents. Stay one step ahead of criminals that try to obtain this information through various means. While you are there, you can also bring a food donation for the Flint Hills BreadBasket.
For more information, see the K-State Credit Union announcement.
Follow these six National Cyber Security Alliance recommendations to better protect yourself online and make the Internet more secure for everyone:
- Strengthen each online account or device. Enable the strongest authentication tools available. A strong password is the first step to protecting yourself. Other strategies might include biometrics, security keys, or unique one-time codes sent to your mobile device.
- Keep a clean machine. Make sure all software on Internet-connected devices — including PCs, laptops, smartphones, and tablets — are updated regularly to reduce the risk of malware infection.
- Personal information is like money. Value it. Protect it. Information about you, such as purchase history or location, has value — just like money. Be thoughtful about who receives that information and how it’s collected by apps or websites.
- When in doubt, throw it out. Cybercriminals often use links to try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
- Share with care. Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it could be perceived now and in the future.
- Own your online presence. Set the privacy and security settings on websites to your comfort level for information sharing. It’s okay to limit how and with whom you share information.
Source: Educause Campus Security Awareness Campaign
If you have any questions about your online safety, contact the IT Help Desk, email@example.com, 532-7722.
by Information Technology Services
In K-State Online, instructors communicate to students via the Inbox. Based on instructor feedback, Information Technology Services has made an improvement to the Inbox for K-State.
Continue reading “Inbox change in K-State Online”
The Dec. 22 email that appeared to be from President Myers is one more example of the need to be vigilant before responding to an email, clicking a link, or opening an attachment. The email appeared to be legitimate. A point of clarification though is communications from President Myers would more than likely be posted in K-State Today. Also when verifying the “reply to” email address, there was an additional “from” email address not associated with K-State (see the highlighted email below).
U.S. CERT (U.S. Computer Emergency Readiness Team) reminds us to remain on the alert and when in doubt, delete the email, avoid clicking on a link and do not open suspicious attachments. When in doubt, DELETE.
In response to the latest phishing scam, Information Technology Services and Communications and Marketing have:
- Blocked the URL for the email on the K-State network
- Sent the attachment to Trend Micro for analysis. The attachment was deemed malicious and Trend Micro is preventing the attachment from being downloaded.
- Posted notices about the scam throughout campus.
Networking & Telecommunications Services needs to replace cable that was
damaged last year when the steam tunnels were flooded. While a fix has
been in place, the work occurring next weekend will permanently repair the cable. Repairs will occur outside of normal working hours and will only affect telephone lines and not data connections.
Work begins on Thursday, August 11 at 5 p.m. The first building to be repaired will be Anderson Hall. Service work will be completed during the evening and telephones in Anderson Hall will be back in operation by 8 a.m. Friday morning. Phone cable replacement will continue after 5 p.m. on Friday, August 12 and run through the weekend.
All phones should be operational by 8 a.m. Monday morning, August 15. If
users experience any outages after these repairs, please call the repair line at 532-7111. Updates will be posted on the www.ksu.edu/its/status page.
Buildings where phone cable will be repaired include:
Marianna Kistler Beach Museum of Art
by Information Technology Services
Whether you are an experienced K-State Online Canvas user or new to teaching with the LMS, we have compiled some tips and tricks to help you through the semester in the Getting started with Canvas course for instructors. Continue reading “Getting started with Canvas”
by Information Technology Services
Mediasite services and content will migrate from the current cloud-hosted provider to on-campus servers during the month of June. In the last year alone, Mediasite has experienced a 360 percent growth in presentations, now totaling more than 17 thousand. With the continued growth of Mediasite, it has become fiscally advantageous to migrate to an on-campus installation. Continue reading “Mediasite June migration”
Kathleen Adams will present “Phishing – not just for days at the lake” at 3 p.m., May 11, via Zoom. Join this session to learn about what happens when a phishing scam hits K-State. So far this year there have been 471 phishing scams reported and 175 compromised eIDs. Phishing is a very serious problem, join the discussion to learn what you can do to protect yourself. Topics include:
- Identifying types of phishing scams
- Sending phishing scams to K-State’s abuse email team with precision
- Learning what we do to take down a phishing scam
- Discovering what happens if an account gets compromised
- Protecting your account from being compromised
Join the session at ksu.zoom.us/j/738417925. Visit the Tech Tips Live! website for information about the series and to view videos of previous sessions.
Yammer is a private social network that connects you to people at K-State and beyond. Yammer makes it easy to share, collaborate, and build a body of knowledge that’s instantly accessible at any time and from any device.
K-State has been using the free version of Yammer for many years. On April 1, Microsoft will begin rolling out Yammer and it will be available from the Office 365 App Launcher in the coming weeks. Join this session to learn all about it.
Cathy Rodriguez, iTAC, will present Yammer Time!, 3 p.m. Wednesday, Mar. 23, via Zoom. Topics include:
- Editing your Yammer profile
- Modifying notifications
- Creating groups and networks
- Joining groups and networks
- Navigating between groups and networks
- Exploring Yammer use cases
Visit the Tech Tips Live! website for information about the series and to view videos of previous sessions. Ideas on future Tech Tips Live! session topics can be sent to firstname.lastname@example.org.