In the past, the RoyalSecure wireless network was all-encompassing – all users were using the same network and had access to the same services. This differed from the wired network, where classes of users are separated (or segmented) into their own network spaces. This segmentation allows for different services to be allowed on different network segments. In an effort to improve security, we have segmented the RoyalSecure wireless network to mirror the wired network. One of the benefits of this change is that faculty and staff can now access the file shares G: and H: from the RoyalSecure wireless network.
Two Step (through DUO) will be required when using our remote (VDI) environments. This does not apply to VDI in classsrooms.
What does this change mean?
After August 19th, when you log into remote.scranton.edu and you enter your credentials (Royal ID and Password), you will receive a push notification on your mobile device. As soon as you authenticate by selecting the green checkbox, you will be able to access remote. If you are using a token, you will be prompted for a temporary code on the login page.
Your Caller ID may include “SPAM?” for known robocallers since December, 2018. This is an attempt by telecommunications carriers to help their customers determine if the call is valid or not. Scam calls made up a large share of the estimated 4.7 billion robocalls to mobile devices in May, according to YouMail, an app that helps block them. That’s more than double the amount from two years ago. The Federal Trade Commission receives about 10,000 robocall complaints per day.
“We’re all fed up with the tens of billions of illegal robocalls we get every year,” Andrew Smith, director of the FTC’s Bureau of Consumer Protection, said in a statement. Fighting “this scourge remains a top priority for law enforcement agencies around the nation.” Carriers are always improving the algorithm used to determine which calls match the SPAM criteria. However, we will still continue to receive unsolicited calls from spammers/scammers.
The University’s Information Technology Division frequently receives requests to block SPAM or other unwanted calls but we are faced with determining if the phone number is actually valid. The spoofed number may belong to someone who justifiably needs to contact the University so we cannot just simply block all requests for unwanted calls. Normally, the calls cease within a few days.
In an attempt to help, you can register your phone numbers with the “Do Not Call” list by calling 1-800-382-1222 from the phone number you wish to register or by adding the number through www.donotcall.gov. You can also register your personal wireless number to the “Do Not Call” list.
However, if your department is receiving an influx of calls, please contact the Technology Support Center at 570-941-4357 in order to immediately block the number and cease the interruption to your business day. If we determine the spoofed number is valid, we will need to unblock the number after a few business days and set up a time to test to see if the calls begin again.
For additional information on Caller ID Spoofing, visit https://www.fcc.gov/consumers/guides/spoofing-and-caller-id
“FTC, Law Enforcement Partners Announce New Crackdown on Illegal Robocalls.” Federal Trade Commission, 5 July 2019, https://www.ftc.gov/news-events/press-releases/2019/06/ftc-law-enforcement-partners-announce-new-crackdown-illegal.
Cybersecurity, data breach, privacy, phishing attempts– I am sure you are most familiar with these words, as they have been frequently used these past years in our campus presentations, national news reports and articles in industry magazines (just to name a few). The threats these words represent are escalating, complicated and quite frankly too important to dismiss.
Listed as the single most pressing issue in the Top 10 IT Issues 2019 from Educause (a non-profit association that helps higher education optimize the impact of IT), it is a University-wide challenge that we must address – together.
Our Information Security Office (ISO) has seen a steady increase in the number of phishing and social engineering attempts. Thankfully, in part due to our programming and outreach (such as cybersecurity month, wellness day presentations, email notices and training) constituents have become more aware of these types of attempts and are increasingly reporting them to the ISO and the Technology Support Center.
The ISO encourages everyone to take advantage of the security awareness training available through SANS to learn more about phishing and social engineering, and recommends that everyone regularly perform a “Malwarebytes Full Scan” to guard against malware (this program is already installed on our campus computers).
As we continue to develop our University security strategies, we ask that you remain vigilant, and never hesitate to call or email us to confirm the validity of an email or phone call. You can reach the Information Security Office at 570-941-4226 or email firstname.lastname@example.org.
Free Security Resources
- The THINK. CONNECT. ™ Campaign is a national public awareness campaign aimed at increasing the understanding of cyber threats. https://www.stopthinkconnect.org/resources
- Through StaySafeOnline, the National Cyber Security Alliance (NCSA) empowers users at home, work and school with the information they need to keep themselves, their organizations, their systems and their sensitive information safe and secure online and encourage a culture of cybersecurity. https://staysafeonline.org/
- Report identity theft to the Federal Trade Commission online at IdentityTheft.gov or by phone at 1-877-438-4338.
- Get the latest information on IRS Tax Scams / Consumer Alerts. https://www.irs.gov/newsroom/tax-scams-consumer-alerts
Free Security Software Resources (for home)
- uBlock Origin Extension (in Google Chrome Browser) is a free and open-source, cross-platform browser extension for content-filtering, including ad-blocking. https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en
- Malwarebytes protects you against malware, ransomware, malicious websites, and other advanced online threats that have made traditional antivirus obsolete. https://www.malwarebytes.com/
- Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised. https://haveibeenpwned.com/
- LastPass is a password manager that stores encrypted passwords online. https://www.lastpass.com/
Our Information Security Office has received several reports of email scams targeting University faculty and staff that involves the purchase of gift cards.
The email begins with subjects like “Follow up” or “Are you available?” and if the recipient replies, the attacker continues to portray a University leader explaining that they are in a meeting and can’t take calls. They urge the recipient to buy gift cards for them promising to reimburse them later.
The end goal is for the criminal to be sent gift cards on the “leader’s behalf” and email pictures of codes to them with the promise of later reimbursement.
**If you receive such an email, DO NOT RESPOND and forward the email to email@example.com**.
If you received a similar email and you purchased gift cards, please contact the University Police for assistance and forward the original message to firstname.lastname@example.org.
Previous story related to this topic:
Office Tip: Forward an Email Message as an Attachment
The community was a large focal point while developing a plan for building access control during emergencies, and time was well-spent in reviewing each entrance and exit of every building on campus. After ensuring that our campus residence buildings were properly equipped to be able to manage door access during an emergency on campus, we spent the better part of 2017 completing access control throughout academic and administrative buildings. The goal was to meet convenience with security.
In completing the project, we were able to create an environment that allows the Royal Card system to control over 50 doors across 22 academic and administrative buildings. We utilize this same process for after hours and weekend events. In order to maintain control of all these doors for emergency events, it is pertinent that any time a door is required to be unlocked, it is done so using Royal IT Support.
How do I require that a door gets unlocked for an event?
If your event on campus requires doors to be unlocked in a campus building, it is important that the doors are properly scheduled to be unlocked, by submitting a request through Royal IT Support.
From the Royal IT Support homepage, you can submit your request by select Request a Service > Royal Card > Royal Card Door Schedule Change Request. Please be sure to include the building, doors, date(s), start time and end time of the event. To ensure the request is completed, submit this request at least 3 days before your event is scheduled.
If you have any questions, please contact the Technology Support Center at 570-941-4357 or email@example.com.
The University’s ability to prepare for and mitigate an emergency always remains a priority. In the event of an emergency, University Police will activate the Emergency Notification System once it has been confirmed that there is any significant emergency or dangerous situation. Then we think, what next?
It was in October, 2015 when a shooting occurred at Umpqua Community College. The suspect went from one building to the next, as we watched those events unfold live on CNN. The reporter asked, how the suspect could continue to enter buildings, when surely Umpqua was in lockdown. Probably at a secondary school where there is typically a single building that would be easy. But we recognized on an open college campus, that’s not always so easily done, especially with so many buildings. Back then, facilities manually unlocked and locked all the doors. And in an emergency could we really expect staff to start manually locking doors, and how long might that take? Consequently, we recognized the importance of implementing some measures to prevent what happened at Umpqua.
So in 2017, University Police, Facilities and IT embarked on a project to be able to remotely control all doors through the Blackboard Transact system. Now with the click of a mouse, most exterior doors can be put into “Royal Card Access Only” or in an extreme situation, a total lockdown. Educating the University Community on how these systems work during an emergency is an ongoing effort.
On any evening or weekend, access to all buildings requires your Royal Card. Should something happen either on or off-campus, we may decide it would be safer to control who has access to our buildings. We can now control access immediately through Blackboard Transact by requiring everyone to use their Royal Card to enter a building. We’ve decided to call this state, “Royal Card Access Only”. This isn’t a lockdown. Typically, classes and all university business would continue as scheduled, unless we decide otherwise. It’s important to recognize that we could be in this controlled state, for hours or even days depending on the situation. Or depending on the incident or threat, we could direct everyone to take shelter by staying inside. If you found yourself outdoors, you would be directed to seek shelter in the nearest building, which would be communicated through our Emergency Notification System.
Depending on the situation we may decide we must go into a “Total Lockdown” where all exterior doors would be locked, and Royal Card access would not be available. Certainly, we’d prefer to give our community the ability to quickly enter a building, therefore this would have to be for an extreme situation where perhaps a suspect has compromised our security system and possess a Royal Card. The strategy is to keep those who are already in a building safe. If you were in a building and in a safe location, you would stay where you are. If you’re not in a building you should immediately leave the area and seek safe shelter off campus, and not return until an all clear is given.
University Police continue to offer our Emergency Response/Active Shooter training. We’ve now incorporated these access control procedures into that presentation. You can also go onto our webpage to learn more, or reach out directly us by calling 570-941-7888 or stopping by in the Parking Pavilion.
Written by Donald Bergmann, Chief of Police at The University of Scranton
The University of Scranton has been experiencing a number of phishing email messages with links to Dropbox documents. The messages appear to be from “Scranton Mail” with a subject of “Login to view your file”.
The messages may appear to be from people you know. If you are not expecting a file, please do not click on the link or open attachments. If you have clicked on anything that requires a password, and believe that the email is not legitimate, it is always a good idea to reset your Scranton password.
Please report any future phishing attempt to our Network and Security Services office at firstname.lastname@example.org.
For questions of concerns, contact the Technology Support Center at 570-941-4357 or email@example.com.
Phishing Email Sample
January 28 was the annual Data Privacy Day, a day to help raise awareness about the importance of privacy and protecting personal information. As a University employee, we ask that you take a moment to change your Self Service password and security questions.
Resetting your information is easy:
- Log into my.scranton.edu, go to the Home tab
- Under Emergency and Password Information, click Select Your Password Reset Questions
- Under Update Personal Information, click Change Pin to update your password
(Please DO NOT use the following special characters: @$&(),<>’;=#%”! or a space.)
Information Resources will be performing updates to the ROYALSECURE wireless network on December 15. As a result, you will need to update any wireless devices (cell phones, tablets and laptops; all operating systems) connected to this network prior to the change. Devices that are not updated before December 15 may no longer be able to connect to the internet and could display a warning about the network being untrusted when connecting.
Desktop computers and gaming devices do not need to be updated at this time.
Please follow the directions below to update your wireless devices:
To update wireless devices while you are on campus:
- Open a browser on the device you wish to update
- Go to http://cloudpath.scranton.edu/wireless/
- Follow the on screen directions
To update wireless devices while being off campus:
- Open a browser on the device you wish to update
- Visit the Technology Support Center’s website at http://www.scranton.edu/techsupport
- Click on the Wireless Network Setup link
- Follow the on screen directions
Questions? Please contact the Technology Support Center at 570-941-4357 or firstname.lastname@example.org.