<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" > <channel> <title>cybersecurity – Technology at MSU</title> <atom:link href="https://tech.msu.edu/news/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" /> <link>https://tech.msu.edu</link> <description>Michigan State University</description> <lastBuildDate>Tue, 25 Jul 2023 14:36:48 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <site xmlns="com-wordpress:feed-additions:1">98790491</site> <item> <title>MSU IT Research & Security Presentation and Workshop</title> <link>https://tech.msu.edu/event/msu-it-research-security-presentation-and-workshop/</link> <dc:creator><![CDATA[Joshua]]></dc:creator> <pubDate>Tue, 15 Nov 2022 11:00:00 +0000</pubDate> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[research]]></category> <guid isPermaLink="false">https://tech.msu.edu/?post_type=tribe_events&p=27294</guid> <description><![CDATA[<ul> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b>Tuesday, November 15, 2022, at 11:00 a.m. at the MSU Union Ballroom</b> </li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><a href="https://www.eventbrite.com/e/msu-it-research-security-presentation-and-workshop-tickets-446237156347"><b>Register here</b></a> </li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><b>All Spartans interested in research cybersecurity are welcome!</b> </li> </ul> <p>Special guest Chief Information Security Officer Mike Corn, UC San Diego, and CISO Tom Siu, MSU, discuss cybersecurity trends in the research space. All Spartans who work or are interested in cybersecurity or academic research are welcome to attend. <a href="https://tech.msu.edu/event/msu-it-research-security-presentation-and-workshop/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<ul> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Tuesday, November 15, 2022, at 11:00 a.m. at the MSU Union Ballroom</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><a href="https://www.eventbrite.com/e/msu-it-research-security-presentation-and-workshop-tickets-446237156347"><b><span data-contrast="none">Register here</span></b></a><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><b><span data-contrast="none">All Spartans interested in research cybersecurity are welcome!</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> </ul> <p><span data-contrast="auto">Special guest Chief Information Security Officer Mike Corn, UC San Diego, and CISO Tom Siu, MSU, discuss cybersecurity trends in the research space. All Spartans who work or are interested in cybersecurity or academic research are welcome to attend. Attendees who RSVP by 5 p.m. Friday, November 11 will receive a boxed lunch.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"><br /> </span></p> <p><b><span data-contrast="auto">Join us on Tuesday, November 15 at the MSU Union Ballroom:</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></p> <ul> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">11:00 – 11:45 a.m. </span><b><span data-contrast="auto">Research & Security Presentation by Mike Corn</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"><span data-contrast="auto">11:45 a.m. – 12:15 p.m. </span><b><span data-contrast="auto">Lunch </span></b><span data-contrast="auto">(RSVP by 11/11 for a boxed lunch)</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">12:15 – 1:00 p.m. </span><b><span data-contrast="auto">CMMC Research Workshop</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span> <ul> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">Workshop is designed for researchers, particularly those affected by security mandates in research contracts/grants.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">Mike and Tom discuss the Cybersecurity Maturity Model Certification (CMMC) from the perspective of the academic advisory council and where research organizations should prepare and focus their effort.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">Mike will present insight and lessons learned at UCSD. </span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">Attendee participation during the discussion is encouraged.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> </ul> </li> </ul> <p><b><i><span data-contrast="auto">Speaker Biographies</span></i></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></p> <p><b><span data-contrast="auto">Mike Corn</span></b><span data-contrast="auto"> is the CISO of the University of California at San Diego, where he manages the Security Office and Identity and Access Management. His areas of interest include privacy, identity management, and cloud services. He has been an active speaker and author on security and privacy and has participated in numerous Educause and Internet2 initiatives. </span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></p> <p><span data-contrast="auto">He is a member of the Internet2 NAOPag, a past co-chair of the Educause HEISC, a member of the REN-ISAC steering committee, and the CMMC AB Academic Advisory Council. Before joining UCSD, he was the CISO & CPO and Deputy CIO of Brandeis University. He was formally the CISO and Chief Privacy and Security Officer of the University of Illinois at Urbana-Champaign. He graduated from the University of Colorado at Boulder and the University of Illinois at Urbana-Champaign.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></p> <p><b><span data-contrast="auto">Tom Siu</span></b><span data-contrast="auto"> leads MSU’s Security Engineering, Security Operations, Incident Response, and Governance, Risk, and Compliance teams within the Information Security department and is responsible for the university-wide information security strategy. Tom joined MSU in 2020 after having served for 14 years as CISO for Case Western Reserve University, where he oversaw the development of the information security program, helped in the centralization of IT under the University Technology, [U] Tech, brand, and organized the multiple institutional partnerships for the CWRU secure research environment, and the 2020 Presidential Debate in Cleveland. </span><span data-ccp-props="{"201341983":0,"335559740":259}"> </span></p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmsu-it-research-security-presentation-and-workshop%2F&linkname=MSU%20IT%20Research%20%26%20Security%20Presentation%20and%20Workshop" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmsu-it-research-security-presentation-and-workshop%2F&linkname=MSU%20IT%20Research%20%26%20Security%20Presentation%20and%20Workshop" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmsu-it-research-security-presentation-and-workshop%2F&linkname=MSU%20IT%20Research%20%26%20Security%20Presentation%20and%20Workshop" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">27294</post-id> </item> <item> <title>Michigan State Police: Cyber Threats and Scams Webinar</title> <link>https://tech.msu.edu/event/michigan-state-police-cyber-threats-and-scams-webinar/</link> <dc:creator><![CDATA[Joshua]]></dc:creator> <pubDate>Mon, 31 Oct 2022 10:00:00 +0000</pubDate> <category><![CDATA[cyber scams]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[phishing]]></category> <guid isPermaLink="false">https://tech.msu.edu/?post_type=tribe_events&p=27292</guid> <description><![CDATA[<ul> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b>Monday, October 31, 2022, at 10:00 a.m. on Zoom</b> </li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><a href="https://msu.zoom.us/webinar/register/WN_HzT45lwUQHer9sRnl6exsg"><b>Register </b></a><b><a href="https://msu.zoom.us/webinar/register/WN_HzT45lwUQHer9sRnl6exsg">Register here</a></b><b> </b> </li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b>All Spartans are welcome!</b> </li> </ul> <p>Detective Sergeant Sam North, <a href="https://www.michigan.gov/msp/divisions/intel-ops/cyber/mc3">Michigan Cyber Command Center</a> (MC3), will discuss common cyber threats and scams lurking online. North will also present ways to identify phishing e-mails, tips to improve cybersecurity and explore criminal investigations related to network intrusions. <a href="https://tech.msu.edu/event/michigan-state-police-cyber-threats-and-scams-webinar/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<ul> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Monday, October 31, 2022, at 10:00 a.m. on Zoom</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><a href="https://msu.zoom.us/webinar/register/WN_HzT45lwUQHer9sRnl6exsg"><b><span data-contrast="none">Register </span></b></a><b><a href="https://msu.zoom.us/webinar/register/WN_HzT45lwUQHer9sRnl6exsg">Register here</a></b><b><span data-contrast="none"> </span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> <li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">All Spartans are welcome!</span></b><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></li> </ul> <p><span data-contrast="none">Detective Sergeant Sam North, </span><a href="https://www.michigan.gov/msp/divisions/intel-ops/cyber/mc3"><span data-contrast="none">Michigan Cyber Command Center</span></a><span data-contrast="none"> (MC3), will discuss common cyber threats and scams lurking online. </span><span data-contrast="none">North will also present ways to identify phishing e-mails, tips to improve cybersecurity and explore criminal investigations related to network intrusions.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":259}"> </span></p> <p><span data-contrast="none">A division of the Michigan State Police, the </span><span data-contrast="auto">MC3</span><span data-contrast="none"> is responsible for coordinating combined efforts of cyber emergency response during critical cyber incidents in Michigan. Emphasis is placed upon prevention, response, and recovery from cyber incidents. Detective Sergeant Sam North has been an enlisted member of the Michigan State Police since 2014. North served at the Lansing Post as a trooper and human trafficking subject matter expert, at the Diversion Investigation Unit, and the First District Cold Case Team before his current position with the Michigan Cyber Command Center, where he conducts investigations into cybersecurity-related criminal activity.</span></p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmichigan-state-police-cyber-threats-and-scams-webinar%2F&linkname=Michigan%20State%20Police%3A%20Cyber%20Threats%20and%20Scams%20Webinar" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmichigan-state-police-cyber-threats-and-scams-webinar%2F&linkname=Michigan%20State%20Police%3A%20Cyber%20Threats%20and%20Scams%20Webinar" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fevent%2Fmichigan-state-police-cyber-threats-and-scams-webinar%2F&linkname=Michigan%20State%20Police%3A%20Cyber%20Threats%20and%20Scams%20Webinar" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">27292</post-id> </item> <item> <title>Cybersecurity Awareness Month Webinars</title> <link>https://tech.msu.edu/news/2021/10/national-cybersecurity-awareness-month/</link> <dc:creator><![CDATA[Joshua]]></dc:creator> <pubDate>Thu, 28 Oct 2021 17:00:27 +0000</pubDate> <category><![CDATA[Featured]]></category> <category><![CDATA[News]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[fraud]]></category> <category><![CDATA[phishing]]></category> <category><![CDATA[SecureIT]]></category> <guid isPermaLink="false">https://tech.msu.edu/?p=25747</guid> <description><![CDATA[<p>October is National Cybersecurity Awareness Month and Michigan State University Information Technology wants to ensure that you stay safe and secure online–which means more than just creating a strong password. Protecting yourself and the MSU community is all about increasing your knowledge so that you can decrease cybersecurity risk. The more aware you are, the safer and more secure you will be. <a href="https://tech.msu.edu/news/2021/10/national-cybersecurity-awareness-month/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p><span data-contrast="auto">October is National Cybersecurity Awareness Month and Michigan State University Information Technology wants to ensure that you stay safe and secure online–which means more than just creating a strong password. Protecting yourself and the MSU community is all about increasing your knowledge so that you can decrease cybersecurity risk. The more aware you are, the safer and more secure you will be.</span><span data-ccp-props="{"134233117":true,"134233118":true}"> </span></p> <p><em>Read: <a href="https://tech.msu.edu/news/2021/10/cybersecurity-tips/">Five Cybersecurity Tips</a></em></p> <p><span data-contrast="auto">The MSU IT Information Security team hosted informative webinars featuring special guests from around our community to discuss unique cybersecurity topics, including <a href="https://comartsci.msu.edu/our-people/rick-wash" target="_blank" rel="noopener">Professor Rick Wash</a>, College of Communication Arts and Sciences, and Director and <a href="https://cj.msu.edu/directory/holt-thomas.html" target="_blank" rel="noopener">Professor Thomas Holt</a>, MSU School of Criminal Justice.</span></p> <h3><b><span data-contrast="auto">How to Catch a Phish</span></b></h3> <ul> <li><a href="https://web.microsoftstream.com/video/1b23521f-0631-4277-93a6-e462b33e8b4c?st=81" target="_blank" rel="noopener"><strong>Watch now</strong></a></li> <li><span data-contrast="auto">ComArtSci </span><a href="https://comartsci.msu.edu/our-people/rick-wash"><span data-contrast="none">Professor Rick Wash</span></a><span data-contrast="auto"> tells us how to spot a phish like the experts.</span><span data-ccp-props="{"134233279":true,"335559740":276}"> </span></li> <li><span data-contrast="auto">Wash’s work involves understanding how people think about their interactions with computers, and their interactions with other people through computers, with a particular focus on security and collaborative systems. He is currently the Primary Investigator on three NSF grants, including an NSF Early Faculty CAREER award.</span><span data-ccp-props="{"134233279":true,"335559740":276}"> </span></li> </ul> <h3><b><span data-contrast="auto">Scrap Value of Your NetID </span></b><span data-ccp-props="{"335559740":276}"> </span></h3> <ul> <li><a href="https://mediaspace.msu.edu/media/Scrap+Value+of+Your+NetID/1_3rxs84hd" target="_blank" rel="noopener"><b>Watch now</b></a></li> <li><span data-contrast="auto">How much is your NetID worth to cybercriminals? The MSU IT Information Security team has the answer.</span></li> </ul> <h3><b><span data-contrast="auto">Okta-ober and MSU’s New Login Experience</span></b><span data-ccp-props="{"335559740":276}"> </span></h3> <ul> <li><a href="https://web.microsoftstream.com/video/aa47303a-bfb1-4f34-83ce-8def658a5583" target="_blank" rel="noopener"><b>Watch now</b></a></li> <li><span data-contrast="auto">MSU’s Information Security team talks about multi-factor authentication and other tools MSU IT uses to help keep our data secure.</span><span data-ccp-props="{"134233279":true}"> </span></li> </ul> <h3><b><span data-contrast="auto">Data Breaches and Fraud</span></b><span data-ccp-props="{"134233279":true,"335559740":276}"> </span></h3> <ul> <li><a href="https://web.microsoftstream.com/video/ef318f64-d3f5-4163-91cb-c234e12881a9" target="_blank" rel="noopener"><b>Watch now</b></a></li> <li><span data-contrast="auto">School of Criminal Justice Director and </span><a href="https://cj.msu.edu/directory/holt-thomas.html"><span data-contrast="none">Professor Thomas Holt</span></a><span data-contrast="auto"> discusses the relationship between data breaches and fraud. He’ll cover why data breaches happen and how they fuel a larger market for stolen card data that people use for fraudulent purchases and economic crime.</span></li> <li><span data-contrast="auto">Holt’s research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work has been published in various journals including Crime and Delinquency, Deviant Behavior, the Journal of Criminal Justice, and Youth and Society.</span><span data-ccp-props="{"335559740":276}"> </span></li> </ul> <p>For more information on cybersecurity best practices, visit <a href="https://secureit.msu.edu" target="_blank" rel="noopener">secureit.msu.edu</a>.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2021%2F10%2Fnational-cybersecurity-awareness-month%2F&linkname=Cybersecurity%20Awareness%20Month%20Webinars" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2021%2F10%2Fnational-cybersecurity-awareness-month%2F&linkname=Cybersecurity%20Awareness%20Month%20Webinars" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2021%2F10%2Fnational-cybersecurity-awareness-month%2F&linkname=Cybersecurity%20Awareness%20Month%20Webinars" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">25747</post-id> </item> <item> <title>MSU IT and MSU Police Unite to Fight Cybercrime</title> <link>https://tech.msu.edu/news/2020/05/fightingcybercrime/</link> <dc:creator><![CDATA[Joshua]]></dc:creator> <pubDate>Tue, 05 May 2020 15:31:37 +0000</pubDate> <category><![CDATA[Featured]]></category> <category><![CDATA[News]]></category> <category><![CDATA[coronavirus]]></category> <category><![CDATA[cyber scams]]></category> <category><![CDATA[cybercrime]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[IT security]]></category> <category><![CDATA[phishing]]></category> <category><![CDATA[SecureIT]]></category> <guid isPermaLink="false">https://tech.msu.edu/?p=23664</guid> <description><![CDATA[<p>As the coronavirus pandemic unfolds, stories of campus heroes have emerged. From <a href="https://msutoday.msu.edu/news/2020/msu-health-care-offers-drive-through-testing-for-covid-19/">healthcare workers on the frontline</a> to <a href="https://msutoday.msu.edu/news/2020/msu-colleges-collaborate-to-create-3d-printed-medical-face-shields-in-response-to-covid-19-crisis/">homemade 3D-printed face shields</a>, Spartans are coming together to support those in need. While heroes provide care, malicious actors are using the crisis to exploit others online.</p> <p>Recently, the FBI <a href="https://www.fbi.gov/coronavirus">reported</a> a significant increase in coronavirus-related scams and cyberattacks, some of which have been directed toward the Michigan State University community. <a href="https://tech.msu.edu/news/2020/05/fightingcybercrime/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p>As the coronavirus pandemic unfolds, stories of campus heroes have emerged. From <a href="https://msutoday.msu.edu/news/2020/msu-health-care-offers-drive-through-testing-for-covid-19/">healthcare workers on the frontline</a> to <a href="https://msutoday.msu.edu/news/2020/msu-colleges-collaborate-to-create-3d-printed-medical-face-shields-in-response-to-covid-19-crisis/">homemade 3D-printed face shields</a>, Spartans are coming together to support those in need. While heroes provide care, malicious actors are using the crisis to exploit others online.</p> <p>Recently, the FBI <a href="https://www.fbi.gov/coronavirus">reported</a> a significant increase in coronavirus-related scams and cyberattacks, some of which have been directed toward the Michigan State University community. In response, MSU IT and MSU Police are working together and sharing resources to prevent, respond, and remedy these attacks.</p> <p><a href="https://tech.msu.edu/wp-content/uploads/2020/05/csecure.png" rel="attachment wp-att-23683"><img decoding="async" class="wp-image-23683 alignright" src="https://tech.msu.edu/wp-content/uploads/2020/05/csecure.png" alt="" width="369" height="203" /></a>MSU IT Interim Chief Information Security Officer Daniel Ayala said cybercriminals taking advantage of a crisis is nothing new. “Times of uncertainty impel people to seek answers to difficult questions,” Ayala said. “This creates opportunities for cybercriminals to manipulate them to do something they wouldn’t normally do.” A common tactic, known as phishing, is the use of emails appearing to be from a trusted source. Disguised as medical professionals or government agencies, these messages often carry attachments loaded with malware. Others include links to fake versions of real websites designed to steal your login credentials or personal information.</p> <p>“Cybercriminals use many angles to separate you from your money and information,” Ayala said. “Playing to pandemic fears, they promise access to vaccines, cures, treatments, and vital information for the virus and related illnesses.”</p> <p>Beware of requests for personal or financial data purported to be used for charitable contributions or expedited access to government loans or fiscal stimulus. “Criminals use language to make it seem that your inaction to respond to their message will result in a loss of opportunity,” Ayala said. “This is a red flag.”</p> <p>Detective Sergeant James Terrill from MSU Police’s Digital Forensics and Cyber Crime Unit said, “There are no shortcuts; If it sounds too good to be true, it probably is. Legitimate entities will never ask for your personal or financial information over the phone or through email.” If you receive a suspicious email or communication, Terrill and Ayala say that the best response is to delete it without opening it or clicking any attachments. If in doubt, simply call a valid number for the person or organization who sent it to verify the information.</p> <p>Perhaps the most important part of cyberattack prevention is education, according to Ayala. “Sound cybersecurity practices are everyone’s responsibility.” He recommends taking preventative measures, such as <a href="https://secureit.msu.edu/safe-computing/index.html">safeguarding devices</a>, <a href="https://secureit.msu.edu/passwords/index.html">creating secure passwords</a>, and <a href="https://secureit.msu.edu/phishing/index.html">learning how to spot a phish</a>.</p> <p>“In law enforcement, when we get a call, it is typically something bad,” said Terrill. “We don’t want that to overshadow the great work good people are doing every day. Our hope is that the community takes some time to learn how to stay safe online.”</p> <p>Find more IT security tips and resources at <a href="https://secureit.msu.edu/">secureit.msu.edu</a>. For IT-related questions or concerns, contact MSU IT Service Desk by phone (517-432-6200 or 844-678-6200), email <a href="https://ithelp.msu.edu">ithelp@msu.edu</a>, or <a href="https://go.msu.edu/itchat">chat</a>.</p> <p>If you believe you are the victim of a cybercrime, contact MSU Police at 517-355-2221 or your local police department. Visit <a href="https://police.msu.edu/">police.msu.edu</a> for more information.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2020%2F05%2Ffightingcybercrime%2F&linkname=MSU%20IT%20and%20MSU%20Police%20Unite%20to%20Fight%20Cybercrime" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2020%2F05%2Ffightingcybercrime%2F&linkname=MSU%20IT%20and%20MSU%20Police%20Unite%20to%20Fight%20Cybercrime" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2020%2F05%2Ffightingcybercrime%2F&linkname=MSU%20IT%20and%20MSU%20Police%20Unite%20to%20Fight%20Cybercrime" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">23664</post-id> </item> <item> <title>MSU IT: Protecting Spartan Data</title> <link>https://tech.msu.edu/news/2017/10/msu-it-protecting-spartan-data/</link> <dc:creator><![CDATA[Ciesa Design]]></dc:creator> <pubDate>Thu, 12 Oct 2017 16:54:27 +0000</pubDate> <category><![CDATA[Blog]]></category> <category><![CDATA[best practices]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[data]]></category> <category><![CDATA[data handling]]></category> <category><![CDATA[hackers]]></category> <category><![CDATA[NCSAM]]></category> <category><![CDATA[security]]></category> <category><![CDATA[social engineering]]></category> <guid isPermaLink="false">https://tech.msu.edu/?p=20242</guid> <description><![CDATA[<p>In practice, data is more than the information that we put into our systems. Data hold people’s identities, the keys to unlocking research quagmires, and the ability to change the way we interact with the observable world. That is why we take data security seriously at MSU IT. </p> <p>We understand deeply that the data we have must be protected from individuals with less altruistic incentives than those of the faculty, researchers, and students at MSU. <a href="https://tech.msu.edu/news/2017/10/msu-it-protecting-spartan-data/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p>In practice, data is more than the information that we put into our systems. Data hold people’s identities, the keys to unlocking research quagmires, and the ability to change the way we interact with the observable world. That is why we take data security seriously at MSU IT.<span data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p>We understand deeply that the data we have must be protected from individuals with less altruistic incentives than those of the faculty, researchers, and students at MSU. We are working to continue to implement industry standards and protocols to protect our data, but we cannot achieve a secure environment without every Spartan following data-handling best practices. <span data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p>Social engineering has become hackers’ preferred method for accessing sensitive information. Social engineering occurs when a hacker convinces an end user to turn over access to the systems they desire. This risk can be mitigated by leveraging multi-factor authentication on systems they regularly access. By using multi-factor authentication, users know that their systems cannot be accessed without their explicit knowledge. MSU has implemented <a href="https://secureit.msu.edu/two-factor/index.html">two-factor authentication</a> on sensitive systems to keep our Spartan data safe. <span data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p>Every year, MSU IT partners with the U.S. Department of Homeland Security and other institutions for <a href="https://www.dhs.gov/national-cyber-security-awareness-month">National Cyber Security Awareness Month (NCSAM)</a> during the month of October. Understanding the importance of keeping personal and professional data safe is a vital part of our educational model at MSU IT. It is every Spartan’s responsibility to protect data and I hope that you will choose to be part of this educational effort. You can help this effort by using your social media accounts to amplify NCSAM messages with the #CyberAware hashtag. <span data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p>In addition to our security and educational efforts, we have proactively worked with several partners outside the university to ensure that the data our Spartans put into the cloud remains up to MSU’s security standards. This may seem like common sense, but the MSU IT works hard to ensure that partnering companies protect our data consistent with the high standards we have developed, implemented, and will continue to foster at MSU.<span data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p>#TeamMSUIT will continue to stay on the cutting edge of data storage, cyber security, and research so we can ensure that Spartan scholars know that their information is protected.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fmsu-it-protecting-spartan-data%2F&linkname=MSU%20IT%3A%20Protecting%20Spartan%20Data" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fmsu-it-protecting-spartan-data%2F&linkname=MSU%20IT%3A%20Protecting%20Spartan%20Data" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fmsu-it-protecting-spartan-data%2F&linkname=MSU%20IT%3A%20Protecting%20Spartan%20Data" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">20242</post-id> </item> <item> <title>Cyber Security: Every Spartan’s Responsibility</title> <link>https://tech.msu.edu/news/2017/10/cyber-security/</link> <dc:creator><![CDATA[Ciesa Design]]></dc:creator> <pubDate>Mon, 02 Oct 2017 12:29:43 +0000</pubDate> <category><![CDATA[News]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[hackers]]></category> <category><![CDATA[National Cyber Security Awareness Month]]></category> <category><![CDATA[NCSAM]]></category> <category><![CDATA[security]]></category> <guid isPermaLink="false">https://tech.msu.edu/?p=20118</guid> <description><![CDATA[<p>Cyber security is every Spartan’s responsibility. That is why MSU IT participates in <a href="https://staysafeonline.org/">National Cyber Security Awareness Month (NCSAM)</a> to help keep the MSU community informed about simple ways everyone can stay safe online. Learn cyber security best practices and tips through MSU IT’s blog and <a href="https://twitter.com/TechAtMSU">Twitter account</a>. These tips can help you understand the simple, proactive measures you can take to protect your digital identity. <a href="https://tech.msu.edu/news/2017/10/cyber-security/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p>Cyber security is every Spartan’s responsibility. That is why MSU IT participates in <a href="https://staysafeonline.org/">National Cyber Security Awareness Month (NCSAM)</a> to help keep the MSU community informed about simple ways everyone can stay safe online. Learn cyber security best practices and tips through MSU IT’s blog and <a href="https://twitter.com/TechAtMSU">Twitter account</a>. These tips can help you understand the simple, proactive measures you can take to protect your digital identity.</p> <h2>Protect yourself online</h2> <p>MSU IT outlines best cyber security practices on the <a href="https://secureit.msu.edu/">SecureIT website</a> where you can learn about your roles and responsibilities in keeping yourself and MSU as an institution safe from cyber crime.</p> <p>You can learn more tips, infographics, and ways to participate by:</p> <ul> <li data-aria-posinset="1" data-aria-level="2">Following the <a href="https://twitter.com/hashtag/CyberAware?src=hash">#CyberAware hashtag</a> on Twitter.</li> <li data-aria-posinset="2" data-aria-level="2">Following <a href="https://twitter.com/STOPTHNKCONNECT">Stop Think Connect</a> on Twitter.</li> </ul> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fcyber-security%2F&linkname=Cyber%20Security%3A%20Every%20Spartan%E2%80%99s%20Responsibility" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fcyber-security%2F&linkname=Cyber%20Security%3A%20Every%20Spartan%E2%80%99s%20Responsibility" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2017%2F10%2Fcyber-security%2F&linkname=Cyber%20Security%3A%20Every%20Spartan%E2%80%99s%20Responsibility" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">20118</post-id> </item> <item> <title>SecureIT site provides information security guidelines to MSU community</title> <link>https://tech.msu.edu/news/2015/04/secureit-site-provides-information-security-guidelines-to-msu-community/</link> <dc:creator><![CDATA[Ciesa Design]]></dc:creator> <pubDate>Fri, 24 Apr 2015 13:47:44 +0000</pubDate> <category><![CDATA[News]]></category> <category><![CDATA[CISO]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[EIS]]></category> <category><![CDATA[Enterprise Information Stewardship]]></category> <category><![CDATA[faculty]]></category> <category><![CDATA[file sharing]]></category> <category><![CDATA[IDP]]></category> <category><![CDATA[Information Security]]></category> <category><![CDATA[Institutional Data Policy]]></category> <category><![CDATA[IT Services]]></category> <category><![CDATA[passwords]]></category> <category><![CDATA[phishing]]></category> <category><![CDATA[safe computing]]></category> <category><![CDATA[SecureIT]]></category> <category><![CDATA[security]]></category> <category><![CDATA[staff]]></category> <category><![CDATA[students]]></category> <guid isPermaLink="false">http://tech.msu.edu/news/?p=4691</guid> <description><![CDATA[<p>The <a href="http://secureit.msu.edu">SecureIT site</a> recently launched to provide the MSU community with one place for guidelines and best practices on information security.</p> <a href="http://secureit.msu.edu"></a> <p>MSU employees first used the site as part of the two-factor authentication rollout in March and April 2015.</p> <p>The site also includes personal safe computing information, ways to safeguard your devices, phishing precautions, password tips, and illegal file sharing details. <a href="https://tech.msu.edu/news/2015/04/secureit-site-provides-information-security-guidelines-to-msu-community/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p>The <a href="http://secureit.msu.edu">SecureIT site</a> recently launched to provide the MSU community with one place for guidelines and best practices on information security.</p> <a href="http://secureit.msu.edu"><img loading="lazy" decoding="async" class="alignright wp-image-4693 size-medium" src="https://tech.msu.edu/wp-content/uploads/2015/04/SecureIT-website-April-2105-290x300-1.jpg" alt="Screen capture of the MSU SecureIT website at secureit.msu.edu." width="290" height="300" /></a> <p>MSU employees first used the site as part of the two-factor authentication rollout in March and April 2015.</p> <p>The site also includes personal safe computing information, ways to safeguard your devices, phishing precautions, password tips, and illegal file sharing details.</p> <p>Institutional data guidelines from the former Enterprise Information Stewardship site is now part of SecureIT, including how to handle data, secure data, and dispose of data and hardware.</p> <p>Also on the site are employee and administrator/supervisor guides related to MSU’s Institutional Data Policy and data breach information and checklists for IT staff.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2015%2F04%2Fsecureit-site-provides-information-security-guidelines-to-msu-community%2F&linkname=SecureIT%20site%20provides%20information%20security%20guidelines%20to%20MSU%20community" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2015%2F04%2Fsecureit-site-provides-information-security-guidelines-to-msu-community%2F&linkname=SecureIT%20site%20provides%20information%20security%20guidelines%20to%20MSU%20community" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2015%2F04%2Fsecureit-site-provides-information-security-guidelines-to-msu-community%2F&linkname=SecureIT%20site%20provides%20information%20security%20guidelines%20to%20MSU%20community" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">4691</post-id> </item> <item> <title>October is National Cyber Security Awareness Month</title> <link>https://tech.msu.edu/news/2014/10/october-is-national-cyber-security-awareness-month/</link> <dc:creator><![CDATA[itcomm]]></dc:creator> <pubDate>Fri, 10 Oct 2014 20:51:51 +0000</pubDate> <category><![CDATA[News]]></category> <category><![CDATA[antivirus]]></category> <category><![CDATA[botnets]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[firewall]]></category> <category><![CDATA[hacked]]></category> <category><![CDATA[identity theft]]></category> <category><![CDATA[malware]]></category> <category><![CDATA[National Cyber Security Awareness Month]]></category> <category><![CDATA[NCSAM]]></category> <category><![CDATA[password]]></category> <category><![CDATA[pharming]]></category> <category><![CDATA[phishing]]></category> <category><![CDATA[safe computing]]></category> <category><![CDATA[SecureIT]]></category> <category><![CDATA[spam]]></category> <category><![CDATA[spyware]]></category> <guid isPermaLink="false">http://tech.msu.edu/news/?p=4380</guid> <description><![CDATA[<p>This year’s theme is <strong>Our Shared Responsibility</strong>. MSU Information Technology (IT) Security encourages the community to get involved and do their part to make our Internet, MSUnet, safer and more secure for everyone.</p> <ul> <li>Read information posted on MSU’s technology security site at <strong><a href="http://tech.msu.edu/secureIT/">tech.msu.edu/secureIT/</a></strong></li> <li>Check the STOP-THINK-CONNECT Web site for additional information at <strong><a href="http://staysafeonline.org/">staysafeonline.org/</a></strong></li></ul> <a href="https://tech.msu.edu/news/2014/10/october-is-national-cyber-security-awareness-month/" class="read-more">Read Full Article → </a>]]></description> <content:encoded><![CDATA[<p>This year’s theme is <strong>Our Shared Responsibility</strong>. MSU Information Technology (IT) Security encourages the community to get involved and do their part to make our Internet, MSUnet, safer and more secure for everyone.</p> <ul> <li>Read information posted on MSU’s technology security site at <strong><a href="http://tech.msu.edu/secureIT/">tech.msu.edu/secureIT/</a></strong></li> <li>Check the STOP-THINK-CONNECT Web site for additional information at <strong><a href="http://staysafeonline.org/">staysafeonline.org/</a></strong></li> <li>Share online safety advice and links to resources on Facebook and Twitter using the hashtag <strong>#NCSAM</strong>.</li> </ul> <h4><a href="http://tech.msu.edu/wp-content/uploads/2014/10/banner-300x250.gif"><img loading="lazy" decoding="async" class="size-full wp-image-4391 aligncenter" src="http://tech.msu.edu/wp-content/uploads/2014/10/banner-300x250.gif" alt="stay safe online logo" width="300" height="250" /></a></h4> <h4><strong>Why is Cyber Security Awareness Important?</strong></h4> <p>To protect the confidentiality, integrity and availability of information in today’s highly networked systems environment requires that all individuals – students, faculty, staff, and visitors:</p> <ul> <li>Understand their roles and responsibilities related to individual and institutional security.</li> <li>Understand the organization’s information technology security guidelines, procedures, and practices.</li> <li>Have at least adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which they are responsible.</li> </ul> <p>Visit the <a href="https://itservices.msu.edu/guidelines-policies/#sid">IT Services website</a> for security guidelines and practices recommended for the MSU community.</p> <p><strong>Have questions?</strong></p> <p>Contact the <a href="http://tech.msu.edu/support" target="_blank">IT Services Support Desk</a> at (517) 432-6200.</p> <hr /> <p><strong>National Cyber Security Awareness Month (NCSAM)</strong> is a coordinated national effort focusing on the need for improved online safety and security for all Americans. NCSA, along with the U.S. Department of Homeland Security and the Multi-State Information Sharing and Analysis Center work together to empower consumers, schools, businesses, and government agencies to stay safe online, devoting the full month of October to public awareness and education. NCSAM reminds us that emerging cyber threats require engagement from the entire American community. This year’s theme “<em>Our Shared Responsibility</em>,” aims to amplify the importance for all Internet users to do their part in making the Internet safer.</p> <p><strong>SecureIT</strong> is Michigan State University’s cyber security awareness initiative. Throughout the year, Information Technology Services keeps the MSU community up to date on the latest information security threats and posts information at <a href="http://tech.msu.edu/SecureIT">tech.msu.edu/SecureIT</a> and @TechAtMSU twitter account. When information security issues arise, IT Services Support Desk alerts are distributed by email and posted at <a href="http://servicesstatus.msu.edu">servicesstatus.msu.edu</a>. The goal of our initiative is to keep the MSU community informed about the latest cyber security threats so that both personal and university information resources remain secure.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F10%2Foctober-is-national-cyber-security-awareness-month%2F&linkname=October%20is%20National%20Cyber%20Security%20Awareness%20Month" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F10%2Foctober-is-national-cyber-security-awareness-month%2F&linkname=October%20is%20National%20Cyber%20Security%20Awareness%20Month" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F10%2Foctober-is-national-cyber-security-awareness-month%2F&linkname=October%20is%20National%20Cyber%20Security%20Awareness%20Month" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">4380</post-id> </item> <item> <title>MSU Security Summit to be held October 14</title> <link>https://tech.msu.edu/news/2014/09/msu-security-summit-to-be-held-october-14/</link> <dc:creator><![CDATA[Ciesa Design]]></dc:creator> <pubDate>Mon, 15 Sep 2014 12:30:40 +0000</pubDate> <category><![CDATA[News]]></category> <category><![CDATA[Chief Information Security Officer]]></category> <category><![CDATA[CISO]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[incident response]]></category> <category><![CDATA[MSU IT Council]]></category> <category><![CDATA[MSU Security Summit]]></category> <category><![CDATA[Security Summit]]></category> <category><![CDATA[threat monitoring]]></category> <category><![CDATA[threat reporting]]></category> <category><![CDATA[vulnerability management]]></category> <guid isPermaLink="false">http://tech.msu.edu/news/?p=4340</guid> <description><![CDATA[<p>The first <a href="http://tech.msu.edu/events/security-summit.php">MSU Security Summit</a> will be held October 14 from 9 a.m. to 12 noon in the MSU Union.</p> <a href="http://tech.msu.edu/events/security-summit.php"></a> <p>The event offers a chance for MSU IT staff to discuss security topics as part of their jobs and the greater campus community. Space is limited, so <a href="https://ebs.msu.edu">register now via EBS</a>. <a href="https://tech.msu.edu/news/2014/09/msu-security-summit-to-be-held-october-14/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p>The first <a href="http://tech.msu.edu/events/security-summit.php">MSU Security Summit</a> will be held October 14 from 9 a.m. to 12 noon in the MSU Union.</p> <a href="http://tech.msu.edu/events/security-summit.php"><img loading="lazy" decoding="async" class="alignright wp-image-4341" src="http://tech.msu.edu/wp-content/uploads/2014/09/security-summit-image-886x1024.jpg" alt="MSU Security Summit event graphic" width="239" height="276" srcset="https://tech.msu.edu/wp-content/uploads/2014/09/security-summit-image-886x1024.jpg 886w, https://tech.msu.edu/wp-content/uploads/2014/09/security-summit-image-260x300.jpg 260w, https://tech.msu.edu/wp-content/uploads/2014/09/security-summit-image.jpg 1300w" sizes="(max-width: 239px) 100vw, 239px" /></a> <p>The event offers a chance for MSU IT staff to discuss security topics as part of their jobs and the greater campus community. Space is limited, so <a href="https://ebs.msu.edu">register now via EBS</a>.</p> <p>The Security Summit is sponsored by the MSU Chief Information Security Officer and the <a href="http://tech.msu.edu/itcouncil/index.php">MSU IT Council</a>.</p> <h2>Presentations</h2> <h3>Threat Monitoring and Reporting</h3> <p>Symantec will present a comprehensive review of the threat trends over the past year, the impact of large-scale breaches, and a projection of future threats.</p> <h3>Vulnerability Management at MSU</h3> <p>Find out more about MSU’s new security initiative of deploying campus-wide vulnerability testing and reporting. This presentation will highlight current successes and planned strategies.</p> <h3>Incident Response</h3> <p>The MSU Incident Response Team will share its objectives and best practices, as well as answer questions. This presentation will also provide information about how incidents are handled at MSU and what you can do to help.</p> <p>More details and the schedule are available on the <a href="http://tech.msu.edu/events/security-summit.php">MSU Security Summit site</a>.</p> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F09%2Fmsu-security-summit-to-be-held-october-14%2F&linkname=MSU%20Security%20Summit%20to%20be%20held%20October%2014" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F09%2Fmsu-security-summit-to-be-held-october-14%2F&linkname=MSU%20Security%20Summit%20to%20be%20held%20October%2014" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2014%2F09%2Fmsu-security-summit-to-be-held-october-14%2F&linkname=MSU%20Security%20Summit%20to%20be%20held%20October%2014" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">4340</post-id> </item> <item> <title>IT Services warns about CryptoLocker malware, cybersecurity</title> <link>https://tech.msu.edu/news/2013/11/it-services-warns-about-cryptolocker-malware-cybersecurity/</link> <dc:creator><![CDATA[Ciesa Design]]></dc:creator> <pubDate>Wed, 06 Nov 2013 21:31:06 +0000</pubDate> <category><![CDATA[News]]></category> <category><![CDATA[CryptoLocker]]></category> <category><![CDATA[cyber intrusion]]></category> <category><![CDATA[cyber security]]></category> <category><![CDATA[cybersecurity]]></category> <category><![CDATA[IT Services]]></category> <category><![CDATA[malware]]></category> <category><![CDATA[ransomware]]></category> <category><![CDATA[SecureIT]]></category> <guid isPermaLink="false">http://tech.msu.edu/news/?p=3572</guid> <description><![CDATA[<p><a href="http://itservices.msu.edu" target="_blank">IT Services</a> is warning computer users about a particularly vicious kind of malware, called CryptoLocker.</p> How CryptoLocker works <p>CryptoLocker encrypts or freezes large parts of a Windows PC’s hard drive, then asks the user to pay to regain access.</p> <p>Once CryptoLocker installs itself, it contacts a remotely operated server run by criminals, called a command-and-control server. <a href="https://tech.msu.edu/news/2013/11/it-services-warns-about-cryptolocker-malware-cybersecurity/" class="read-more">Read Full Article → </a></p>]]></description> <content:encoded><![CDATA[<p><a href="http://itservices.msu.edu" target="_blank">IT Services</a> is warning computer users about a particularly vicious kind of malware, called CryptoLocker.</p> <img loading="lazy" decoding="async" class="alignright size-medium wp-image-3446" title="20121119.GK.6703-woman-computer" src="http://tech.msu.edu/wp-content/uploads/2013/11/20121119.GK_.6703-woman-computer-300x199.jpg" alt="A student works on a laptop computer" width="300" height="199" /> <h2>How CryptoLocker works</h2> <p>CryptoLocker encrypts or freezes large parts of a Windows PC’s hard drive, then asks the user to pay to regain access.</p> <p>Once CryptoLocker installs itself, it contacts a remotely operated server run by criminals, called a command-and-control server.</p> <p>On that server, criminals create a unique set of encryption keys for each individual PC using the RSA encryption algorithm — one key to encrypt the computer’s data, and one key to decrypt it.</p> <h3>More details on CryptoLocker</h3> <ul> <li><a href="http://krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransomware/" target="_blank">How To Avoid CryptoLocker Ransomware</a></li> <li><a href="http://nakedsecurity.sophos.com/2013/10/18/cryptolocker-ransomware-see-how-it-works-learn-about-prevention-cleanup-and-recovery/" target="_blank">CryptoLocker ransomware – see how it works, learn about prevention, cleanup and recovery </a></li> </ul> <h2>Be safe online</h2> <p>There have been several cyber intrusions like this one making national news recently, and more can be expected. These threats are real and could be aimed at MSU faculty, staff and students.</p> <p>Minimize the potential consequences of these intrusions by knowing and following safe computing practices.</p> <p><a href="http://tech.msu.edu/secureIT" target="_blank">MSU SecureIT</a> offers tips and suggestions including:</p> <ol> <li>Make sure your personal firewall is turned on.</li> <li>Perform regular operating system updates and software updates. These updates often include security patches.</li> <li>Install antivirus and antispyware software.<strong></strong></li> <li>Upgrade to the latest version of your browser and take advantage of the security features available.</li> </ol> <p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2013%2F11%2Fit-services-warns-about-cryptolocker-malware-cybersecurity%2F&linkname=IT%20Services%20warns%20about%20CryptoLocker%20malware%2C%20cybersecurity" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2013%2F11%2Fit-services-warns-about-cryptolocker-malware-cybersecurity%2F&linkname=IT%20Services%20warns%20about%20CryptoLocker%20malware%2C%20cybersecurity" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Ftech.msu.edu%2Fnews%2F2013%2F11%2Fit-services-warns-about-cryptolocker-malware-cybersecurity%2F&linkname=IT%20Services%20warns%20about%20CryptoLocker%20malware%2C%20cybersecurity" title="Email" rel="nofollow noopener" target="_blank"></a></p>]]></content:encoded> <post-id xmlns="com-wordpress:feed-additions:1">3572</post-id> </item> </channel> </rss> <!-- Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/ Page Caching using Disk: Enhanced (Page is feed) Served from: tech.msu.edu @ 2025-03-14 14:15:53 by W3 Total Cache -->