Kansas State University

search

IT News

Tag: P2P file sharing

Six things you need to know about IT security at K-State

K-State broke a record in 2010, but it is not a record to be proud of:  445 K-Staters were tricked into giving away their passwords to criminals in response to spear-phishing scam e-mails. The criminals then used the stolen information to sign in to webmail and send thousands of spam messages.

Obviously, the first thing on this semester’s top-six security list must be:

  1. Never give your password to anyone in an e-mail message! K-State was plagued by 406 instances of phishing scams in 2010 (compared to 296 in 2009)  that try to trick people into replying with their eID password. The hackers responsible for these scams are relentless! If you remember this one simple rule, you can prevent becoming a victim: K-State IT support staff will never ask for your password in an e-mail, nor will any legitimate business or organization. If you get such an e-mail, just delete it. The same holds if you get an email with a link to a web form that asks you to fill in your username and password – don’t do it!
  2. Continue reading “Six things you need to know about IT security at K-State”

Six things you need to know about IT security at K-State

IT security = YOUThus far in 2010, 292 K-Staters have been duped by spear-phishing scam e-mails and given away their eID password to criminals who then use the stolen information to sign in to webmail and send thousands of spam messages. Sadly, we’re on pace to break last year’s record of 431 K-Staters who gave away their passwords in this way.

Obviously, the first thing on this semester’s top-six security list must be:

  1. Never give your password to anyone in an e-mail message! K-State was plagued by nearly 300 instances of phishing scams in 2009 (and 260 thus far in 2010!)  that try to trick people into replying with their eID password. The hackers responsible for these scams are relentless! If you remember this one simple rule, you can prevent becoming a victim: K-State IT support staff will never ask for your password in an e-mail, nor will any legitimate business or organization. If you get such an e-mail, just delete it. The same holds if you get an email with a link to a web form that asks you to fill in your username and password – don’t do it!
  2. Learn to recognize scams, frauds, and other forms of malicious communications so you don’t become a victim of identity theft, financial fraud, or end up with a compromised computer. Criminals are using all kinds of new tricks and coming at you from all angles — e-mail, social networking sites like Facebook and Twitter, malicious links on webpages, Instant Messaging, phone calls, and even knocking on your door. As an example, last year more than 230 K-Staters were tricked into opening malicious e-mail attachments, resulting in 230+ compromised computers. Be informed and think before you click! Continue reading “Six things you need to know about IT security at K-State”

Peer-to-Peer file sharing programs prohibited on K-State computers

Ever since Napster wreaked havoc on K-State’s computer networks in the fall of 1999,  the use of Peer-to-Peer (P2P) file sharing applications on K-State’s data network has been prohibited by policy.  Partly because of new requirements outlined in the Higher Education Opportunity Act of 2008, K-State revised its P2P file sharing policy during the fall 2009 semester to clarify expectations and to articulate the risks of P2P file sharing that go far beyond violating copyright laws.

Continue reading “Peer-to-Peer file sharing programs prohibited on K-State computers”

Spring 2010: Five things you need to know about IT security at K-State

In 2009, 431 K-Staters were duped by spear-phishing scam e-mails and gave away their eID password to criminals, who then used the stolen information to sign in to webmail and send hundreds of thousands of spam messages. Obviously, the first thing on this semester’s top-five security list must be:

  1. Never give your password to anyone in an e-mail message. K-State was plagued by nearly 300 instances of e-mail scams in 2009 that try to trick people into replying with their eID password. It has not slowed down in 2010. If you remember this one simple rule, you can prevent becoming a victim of these scams: K-State IT support staff will never ask for your password in an e-mail, nor will any legitimate business or organization. If you get such an e-mail, just delete it.
  2. Continue reading “Spring 2010: Five things you need to know about IT security at K-State”

Five things you need to know about IT security at K-State

Thousands of new faculty, staff, and students have arrived and a new semester has begun, so it is time to remind everyone of their personal responsibility in protecting themselves online and keeping K-State information and technology safe. To quote IT security experts, “the Internet is a bad neighborhood,”* and based on the number of security incidents at K-State thus far in 2009, it’s getting worse. You can still function safely online, though, if you take the time to learn about security and “think before you click.” Here are five things you need to know about IT security at K-State:

  1. Never give your password to anyone in an e-mail message. K-State has been plagued by more than 200 instances of e-mail scams over the last year that try to trick people into replying with their eID password (yes, that’s nearly one per day). In fact, thus far in 2009, nearly 300 K-Staters have had their eID password stolen this way. If you remember this one simple rule, you can prevent becoming a victim of these scams:  K-State IT support staff will never ask for your password in an e-mail, nor will any legitimate business or organization. If you get such an e-mail, just delete it.
  2. Continue reading “Five things you need to know about IT security at K-State”

Illegal filesharing on campus: What you need to know

Sharing copyrighted music, movies, and games is against the law and K-State policy.

The Higher Education Opportunity Act of 2008 makes it the responsibility of the university to educate K-Staters about the dangers of illegally sharing files through Peer-2-Peer (P2P) networks.

To help protect K-Staters from lawsuits and to abide by this mandate, K-State’s IT security team created a new website and an informational handout (PDF) to inform students, faculty, and staff.

What is Peer-2-Peer?

Continue reading “Illegal filesharing on campus: What you need to know”

Peer-to-Peer file sharing risks

Since May 2000, K-State policy has prohibited the sharing of music, movies, software, etc via peer-to-peer (P2P) file sharing applications like eMule and BitTorrent because of the impact on network performance. This policy and K-State’s position of blocking P2P network traffic at the campus border was bolstered by the recently passed Higher Education Opportunity Act that includes provisions designed to reduce illegal sharing of copyrighted materials through P2P applications on college campuses. Continue reading “Peer-to-Peer file sharing risks”