Button to scroll to the top of the page.

PRINT NIGHTMARE

Please see this page for all Print Nightmare documentation: https://wikis.utexas.edu/display/cnsoitpublic/CNS+IT+Response+to+the+Microsoft+Spooler+Service+Vulnerability

Ransomware/AnyDesk/TeamViewer/FileZilla

Please be aware there is an uptick in ransomware attacks across our University and the world such as the recent meat packing hack. Hackers are utilizing the remote control software AnyDesk and TeamViewer to install ransomware that locks or deletes all files on the computer and connected servers. These are not approved remote management solutions and the ISO is actively quarantining systems that are using them. FileZilla also has a similar concern and should not be used, we recommend using http://cyberduck.io/ or https://winscp.net/. Please submit a ticket to our help desk for assistance in locating an approved solution.

Important IT Information to Know Before Returning to the Office, 5/13/2021

Replacing hardware for computers, connecting to the network after you have been away, knowing how to meet current online security requirements and practices for accessing UT Data are important topics as faculty and staff who have been off campus make any plans to return. Please take a few minutes to read this important article from CNS IT and bookmark it for the future: https://wikis.utexas.edu/x/yB7TEQ.

Keep Up IT Vigilance and Maintenance, 3/25/2021

IT Executive Director Mark McFarland emphasizes the importance of:
- Staying vigilant against phishing attacks. PYSA is a malware that has been targeting people in higher education. Please remain alert to protect against cybersecurity threats. 
Patching/updating your system within 30 days of updates being released. By April 4, please be sure you have: 

1) Checked your back-up status.
2) Installed required updates for your Mac or Windows machine and rebooted your computer.

Note from Interim Dean Vanden bout:

We are creating a new security group within CNS IT with the charge of overseeing the College's response to security incidents and events that have the potential to negatively impact the faculty, students and staff in CNS.  The purpose of this group is to be proactive in protecting us from the disruption of downtime, and the potential financial loss associated with computer crime.  One of the first projects will be to install a “vulnerability management” tool known as Nessus on all university-owned computers. To cut down on the number of quarantined systems and prepare for the network centralization efforts, we will continue to move most devices to a more secure network. Matt Davidson is leading this group and is reporting directly to Mark McFarland for issues pertaining to computer and information security.  Additional communication will follow via the college's newsletter. Please see this link for additional information and how it will impact you: https://cns.utexas.edu/information-technology/it-security

-- David Vanden Bout, Interim Dean, Collge of Natural Sciences

Charge:

  1. Identify security vulnerabilities and develop plans and solutions for remediating those vulnerabilities.
  2. Develop progress reports as we move forward. 
  3. Work directly with faculty and the ISO to ensure that the needs of CNS are adequately addressed.
  4. Work directly with staff in CNS IT, departments, research centers, labs, and any unit whose unique needs require specialized support to ensure that all networked systems comply with UT System, federal, state, and local security policies.
  5. Supplement the ISO's training program: https://security.utexas.edu/education-outreach for new and existing faculty, staff, and students.
  6. Be completely transparent with the college's faculty and staff.

Methods of implementing charge:

  1. Protect CNS from the world: Continue to move the majority of devices from a world accessible network to a campus only network by implementing the changes defined by the network and telecommunications leadership committee: https://itlc.utexas.edu/networking
  2. Protect the college's computers from others: Implement endpoint management for all university-owned Windows (SCCM), Mac (Jamf), and Linux (Puppet) computers in order to comply with the policies defined by the endpoint management group: https://itlc.utexas.edu/committees/endpoint-management.
  3. Protect users: Implement a communication plan and training program. Please see here for past communications: Security Communications
  4. Protect research and student data: Ensure systems are secure and in compliance with https://security.utexas.edu/policies/irusp
    1. Vulnerability Scanning: Install the Nessus tool which will scan and report system information including vulnerabilities to the central information security office, this does NOT send any user data other than who the user is. 
    2. Antivirus software: The University currently uses Cisco AMP for university-owned machines. Please see this recommendation for personal machines.
    3. Backup: While we recommend folks to use cloud storage such as UT Box so data is automatically backed up and version control is in place, we also strongly recommend backing local data using UT Backup. All computers deployed by CNS are configured with UT Backup.
  5. Maintain device and risk inventory: Via the state-required ISORA survey https://security.utexas.edu/risk/isora
  6. Define policies: CNS is unique to the university in many ways and requires a supplement set of policies specific to a complex research organization. We will have additional policies that will supplement the ISO's policies. On that same thread, we will also create an exception process for business cases.

COVID-19 Update

The university is operating with personnel focused on its core priorities.

Latest Updates

Print Spooler Vulnerability

Status Page

Zoom

Zoom video conferencing software is now available!

Go to Zoom

Request Assistance

We're here to help during this challenging time.

Please log in to continue.