ANR Employees
University of California
ANR Employees

Posts Tagged: cybersecurity

Cybersecurity tips for travel, admin rights available online

Jaki Hsieh Wojan, chief information security officer, has recorded two brief videos that employees may watch at their convenience to learn more about cybersecurity.

One video discusses best practices and general advice for securing devices, such as laptops, when traveling internationally. If you are planning a trip to another country and need to bring work materials, it is a must watch. “Travel Advice with Jaki Wojan” is on YouTube at https://youtu.be/nIviuY5g9_0.

The other video discusses privileged access or administrative rights on local devices. It describes the risks and responsibilities associated with having privileged access, and the process for acquiring those rights. Anyone who wants administrative rights on their device should watch “Admin Rights & Cybersecurity Best Practices with Jaki Wojan” at https://youtu.be/NixotK0SUy4 before submitting a request to IT.

Posted on Tuesday, March 28, 2023 at 9:22 AM

How to spot a phishing email

Don't give cybercriminals access to your data. Beware of phishing emails. Image by Mohamed Hassan from Pixabay

Phishing emails are the most common way cybercriminals attempt to gain access to an organization's systems. Spam filters will catch many of these emails, but your trained eye can easily spot the rest. Here are some tips to help you spot a phishing email and keep ANR safe from malicious actors.

Below is a suspicious email received by an ANR employee this week. The employee noticed the email seemed off and sent it to IT.  Great job at spotting the phish!

Blank subject line and poor spelling and grammar make this email suspicious.
  1. Check the sender 

This may be a legitimate UC Davis email account, but it seems weird that a random person at UC Davis would send notification of an Office 365 termination to an ANR employee. If there was an issue with an Office 365 account, notification would likely come from ANR's IT – not directly from UC Davis. Additionally, if the email sender is someone you don't know and don't normally communicate with, keep your guard up.

  1. Subject line

In our example above, the subject line is blank.  For an email notifying someone of account termination, there should be a formal subject line. This is a red flag.

  1. Poorly written

You can often tell if an email is a scam if it contains poor spelling and grammar.

A notification of account termination would be formal and checked for spelling errors and poor grammar. Informal emails on serious subjects containing awkward grammar and misspelled words are likely phishing attempts.

  1. Suspicious links

Whenever a link is sent in an email, use your mouse to hover over the link to see where it really leads.  If a hyperlink address does not match the address text, it is most certainly a phishing attempt.

In this example, the hyperlink is going to a Google Doc Form – not a URL you would normally use to log into Office 365.

Use these tips to help identify phishing emails. When in doubt – don't click a link in an email, reach out to IT or your unit director for verification of an email's legitimacy.  

Posted on Tuesday, December 20, 2022 at 2:44 PM
  • Author: Jaki Hsieh Wojan, Chief Information Security Officer
Tags: cybersecurity (12), December 2022 (10)

IT team rises to challenge of cyberattacks

Thank you all for your patience and understanding while the ANR server was the target of an unprecedented aggressive and persistent cyberattack. I am happy to report that most web services are back online. We have all come to depend on websites for communication and outreach and I sincerely apologize for the anxiety and hardship it created as you tried to find work-arounds to conduct business.
 
I commend Chief Information Officer Sree Mada and the IT team for their heroic efforts to restore service during the two weeks that the UC ANR server was under siege. Our colleagues Ron Walker, Jon Wilson, Lora Schroeder, Steve Edberg and Bryon Noel worked around the clock to secure UC ANR's web servers and assets. Once they found an effective solution, we were back online in about 48 hours.
 
Big thanks also to our IT colleagues Mark Boyce and Larry Ross at UCOP and Dave Zavatson at UC Davis for lending their expertise and resources to restore service while we await delivery of the new firewall, which is on back order due to supply-chain issues.
 
If you encounter continuing difficulties with UC ANR websites, please alert the IT team at anritg@ucanr.edu.
 
Thanks to all of you for your dedication and hard work in spite of unexpected challenges. I continue to be amazed at the ingenuity of ANR people to solve problems.
 
Glenda Humiston
Vice President
Posted on Friday, October 8, 2021 at 8:52 AM
Tags: cybersecurity (12), IT (11), September 2021 (11)

Update on Accellion data breach

UC was one of more than 100 institutions targeted by a nationwide cyber-attack. As a result, certain university data was accessed without authorization. Protecting the UC community remains the university's top priority. Visit UCnet's Accellion data breach page to learn how to protect yourself, find answers to your questions, and get more information on how you can access free credit monitoring and identity-theft protection.  

You can also contact an Experian call center dedicated to the UC breach at (866) 904-6220. 

The Substitute Notice of Data Breach was updated on May 21. The FAQs for the Accellion incident are frequently updated so please check https://ucnet.universityofcalifornia.edu/data-security/updates-faq/index.html regularly.

 

Posted on Tuesday, May 25, 2021 at 1:01 PM
Tags: cybersecurity (12), May 2021 (17)

FAQs about the Accellion data breach updated

UC is one of several institutions targeted by a nationwide cyber attack on Accellion's File Transfer Appliance (FTA), a vendor service used for transferring sensitive information. This attack has affected approximately 300 organizations, including universities, government institutions and private companies. In this incident, the perpetrators gained access to files and confidential personal information by exploiting a vulnerability in Accellion's program.

You may register with Experian IdentityWorks for credit monitoring services, using the enrollment code JCZGTC333. If you have already registered, there is no need to take any further action to activate your monitoring. 

UCOP has published FAQs in both English and Spanish and is adding to and updating the list as more information becomes available: https://ucnet.universityofcalifornia.edu/data-security/updates-faq/accellion-faq.html. These FAQs address more questions from the community, including questions about the Experian notifications.  

UCOP has added recorded webinars about ways people can protect themselves to https://ucnet.universityofcalifornia.edu/data-security/index.html, in both English and Spanish. 

UC regards the privacy of all of our community members with the utmost seriousness. We will keep the UC ANR community updated as we learn more and are able to share additional information.

Posted on Monday, April 26, 2021 at 1:57 PM
Tags: April 2021 (17), cybersecurity (12)

Read more

 
E-mail
 
Webmaster Email: lforbes@ucanr.edu