Main Nav

Participate in this Group

Search This Group

June 19, 2013 | Cheryl O'Dell

Ben,

 

We use Touchnet hosting services and have limited our PCI scope.  We’ve had no problems.  We’ve been using it for several years.  If you need further info from me – contact me directly.

 

Thanks,

Cheryl

 

 

Cheryl O’Dell, CISSP

Emporia State University

Information Technology

Director, Information Security and Compliance

1200 Commercial, Campus Box 4018, Emporia, Kansas 66801

codell@emporia.edu    620-341-5969

 

 

...
June 18, 2013 | Listserv Anonymous User
Message from aperry@murraystate.edu

We do have a document specifically for that purpose. Contact me offline and I'll get you a copy of it. There's nothing sensitive about the document, I just don't have an electronic copy. (There are only 2 people with that level of authority at our University.)

Drew Perry
Security Analyst
Murray State University
(270) 809-4414
aperry@murraystate.edu

***MSU Information Systems staff will never ask for your password or other confidential information via email.***



June 7, 2013 | Kevin Halgren
For those of you already using Google or Microsoft cloud e-mail solutions, I'll be curious to hear the reactions on your campuses to this news. I believe the tech companies are telling the truth when they say they don't provide direct backdoor access into their systems and that the PRISM presentation may overstate the cooperation and capabilities of the system, however that doesn't preclude the government from abusing existing systems and capabilities e.g. those under CALEA lawful intercept capabilities. Kevin -- Kevin Halgren Assistant Director - Systems and Network Services Washburn University (785) 670-2341 kevin.halgren@washburn.edu
June 6, 2013 | Warren Raquel
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 We are looking for a new security engineer/incident responder at the NCSA. This person will be on the team responsible for day-to-day security operations, providing incident response, and running some really innovative technology (including one of the largest Bro IDS clusters in production anywhere). The HPC environment with Blue Waters provides one of the most interesting and challenging opportunities out there for security people in higher ed. If you are interested, you can follow the link below to apply. http://www.ncsa.illinois.edu/AboutUs/Employment/A1300136.html - -- Warren Raquel Incident Response and Security Team Lead National Center for Supercomputing Applications +1 (217) 333-2876 PGP Fingerprint: F88E 960B 6193 A3ED 0BB2 45C7 7DF9 57DB 6DCF 34C1 -----BEGIN PGP...
June 5, 2013 | Jane Rosenthal

Hello all,

I’ve seen other U’s that have the email directory behind the portal log-in—still allows for collaboration, but is not “public” or open to the world.  I would love to see this model here—just cuts down on external crawling of our site and protects the users.

 

We have 2 things at KU—one a student may choose to restrict their email address from showing up in the public/online directory if they do that in the privacy settings.

 

Second, at KU we have email as directory info, however, our policy states that email in bulk is not released due to privacy issues.

Further, our state Open Records/Sunshine laws allows us to not provide bulk listings e.g. name + email of all students if the requesting party is asking for the listing for...

June 4, 2013 | Josh Flaherty

Greetings,

 

Perhaps like many others, we are continuously adding applications that can be accessed through our single sign on portal.  Some of these applications are administrative and provide access to sensitive data.  We are taking a number of steps to reduce the risks associated with the portal but we are wondering what steps other entities are taking? 

 

Do any of you have double or separate factor authentication for critical administrative applications provided within the portal?

 

Below are some of the things that we have/are effecting;

·         An “I have read this checkbox” containing security best practices upon first logon

...
June 4, 2013 | Theresa Rowe
We do not have email addresses as directory information. It hasn't hampered student collaboration, according to our Student Congress, and the recently reaffirmed they want to continue this way. 

Theresa

On Friday, May 17, 2013, John Forker wrote:
We are deliberating over whether we should or shouldn't include student email addresses in our list of  directory information elements as allowed by FERPA.  If you institution has chosen not to include email addresses as part of directory information, how do you control unauthorized access in a way that doesn't stymy collaboration among students and among students and industry representatives   If your institution has chosen email addresses to be part of directory information, have you faced a barrage of Freedom of Access requests under your state laws (if applicable)?
----------------
John...
May 31, 2013 | Kevin Shalla

Yeah, it sounds scary, but don’t most systems protect the password file so that hackers don’t have easy attack access? Or are we to assume that attackers have easy access to our password files?  If that’s the case, then we probably all need to convert to two or three factor authentication, including tokens or biometrics.

 

Kevin

 

May 29, 2013 | Mike Hanson
Hi Jim,

We used to use CheckPoint but happily moved away from it because of numerous issues. 

We are now using PGP/Symantec encryption, and while not perfect it much better than our CheckPoint experience.



Mike Hanson, CISSP
Network Security Manager
The College of St. Scholastica
Duluth, MN 55811






May 29, 2013 | Listserv Anonymous User
Message from fishermc@wofford.edu

We use SCEP with SCCM and it works well. The price is great and its really easy to manage using SCCM. With SCCM you  have good built in reports and it allows you to create custom reports as well if you like to look at reports.

 

Matt

 

May 28, 2013 | Brandon Payne
Our Business and Community Education department is looking into purchasing some CRM software that will enable them to track both employers and participants. What CRM software do you recommend? We have Google Apps, so integration with that would be a plus.

Thanks!
--
Brandon Payne
Technical Support Specialist
Sauk Valley Community College
May 24, 2013 | Robert Bayn
I get phish messages reported by my users.  There are generally several different ones a day that have links to a password collection web form at a host at webs[.]com.   I submit a complaint about the URL to the webs[.]com report page and they generally remove the page within a day.  But phishers probably get most of their passwords within the first day anyhow.

Six months ago, we were being phished with google spreadsheet form pages, but since the Oxford fiasco, Google has placed "do not enter your password on Google Forms" right above the submit button.  We hardly see Google forms linked in phish messages anymore.

Like Google, the Webs service is used for many non-hazardous purposes, too.  A brief attempt here to blacklist all of webs[.]com resulted in some complaints from people who actually use that service to host their personal/professional home page.  And I've seen other benign links to webs[.]com in...
May 24, 2013 | Greg Schmalhofer

Does anyone use the DNS service OpenDNS, either the free version or the purchased product called Umbrella, for their campus DNS service? If so I’d appreciate it if you could provide your thoughts on service. Or info if you are using another similar product.

 

-           How long have you used OpenDNS?

-           Have you seen a reduction in phishing attempts and/or malware on your campus network?

-           Have you seen any difference with performance?

-           Are you using the free or purchased version?

-       ...

May 15, 2013 | Rebecca Fowler

I’m trying to gauge what other institutions are doing regarding clickable links in instant messaging programs.  We currently block links that are sent through our Microsoft Lync implementation but we’d like to determine what other peer institutions are doing.

 

Does your university block clickable links through technical means? Do you allow clickable links but display a pop-up or warning message?  Or do you deal with this issue strictly from an awareness perspective?

 

Thanks for any information you can share!

 

Becky Thurmond Fowler, CISSP

Information Security and Access Management

Division of Information Technology

University of Missouri

(573)...

May 14, 2013 | George Moore

Greetings:

I’m hiring an Information Security Analyst (ISA) for Salem State University in Salem Massachusetts. An ideal candidate is motivated and enthusiastic about security. The ISA is responsible for monitoring the university network for security vulnerabilities and compromised systems. The candidate accomplishes these goals by monitoring intrusion detection systems, performing vulnerability assessments and management of network firewalls.

 

Qualifications:

 

1. Three years of information security experience.
2. A bachelor degree in appropriate area of expertise or industry recognized certification such as SANS/GIAC, or CISSP.
3. Strong knowledge of security flaws such as weak configurations, SQL injection, cross site scripting, buffer overflows and social engineering.  

...
May 10, 2013 | Listserv Anonymous User
Message from win-hied@bradjudy.com

We have just posted a newly created position here in the System Administration division of the University of Colorado.  This division is similar to what some other multi-campus systems call the Office of the President.  That means we’re small (<400 staff, 100 of which are IT) and have no faculty or students – purely administrative staff.  We are located in our own office building in downtown Denver (1800 Grant St), just a few blocks from the capital. We have a focus on our ERP systems (PeopleSoft) and other multi-campus services (research administration, data warehouse, etc.), as well as the IT services for the division staff (AD, Exchange, SharePoint, etc). 

 

The position is for a mid-level (or ambitious junior) information security analyst to take the lead on operational security technical work in...

May 9, 2013 | John Kaftan
Hello:

I have been using 802.1x for a couple of years now on the wireless side and I am just starting to play with it on the wired side.

I have run into a snag.  I can authenticate with Windows 7 sp1 only if I save my credentials within the network settings or if my computer is on the AD domain and I check "Automatically use my Windows logon name and passoword". 

If I plug-in a machine that is not configured in either of the above ways Windows never prompts me for my credentials.

When I compare packet captures I see that, when it works,  the switch sends 1-2 eap packets initially and then the client responds with an eap packet and then the switch sends a challenge and so on.  

When it doesn't work I see the switch sending an eap packet and the client just doesn't respond so the process just stops right...
May 9, 2013 | Tracy Mitrano
You guys asked for it, and we got it, thanks to a grant from Microsoft!

Please join us tomorrow, Friday, May 10, beginning at 8:30 am EDT, for the live streaming of the Cornell Information Technology and George Washington University Law School Privacy Information Management Forum Introduction and Panel Session by following the link below:


If you can't make the live stream (early for Hawaii and Pacific time!), the event will be archived and a link may be found from this landing page, which also tells you more about the event and includes an agenda, below:  


...
May 8, 2013 | Janine A. Roeth
Hi all,

A question from our desktop management group:
-----------------
Do you have an approach to addressing Potentially Unwanted Applications (PUAs)?  We get alerts from Sophos for PUAs, but need to confirm if the software in the alert is a problem. Example: "PDFCREATORSETUP.EXE" -- part of "Install Core Installer"  
-----------------

Thanks

Janine
---------

Janine A. Roeth 
jar@ucsc.edu
Director, Client Services & Security
Information Security Officer
ITS, UC Santa Cruz
831-459-5401 (voice)
http://its.ucsc.edu/
PGP:  1422 2319 D4F7 85ED BD3F  4A93 86AA E97B 53BE 7493
May 8, 2013 | Doug Pearson
May 8, 2013 To: IT Security Staff, and Network and DNS Administrators REN-ISAC ALERT: Prevent your institution from being an unwitting partner in denial of service attacks The REN-ISAC [1] wants to raise awareness and drive change concerning common network and domain name system (DNS) configurations that fall short of accepted best practice and which, if left unchecked, open the door for your institution to be exploited as an unwitting partner to crippling denial of service attacks against third parties. Please note important, specific recommended ACTIONS included below. Although attacks exploiting the network and DNS configuration weaknesses have been around for a long time, the frequency and impact of attacks have grown over the past year. These attacks may exploit thousands of institutional DNS servers to create an avalanche of network traffic aimed at a third-party victim. The traffic sourced by any single institutional system may be small enough to go unnoticed at the...
May 8, 2012 | Mark T. Nardone
Many of us have some form of "Guest Wireless Access", I am interested in what others are doing in terms of restricting that access. Do you: Require any kind of registration or authentication? Restrict the bandwidth, or access to ports and functionality in any way? Do you allow P2P from the guest range? Here at NEU we do not allow access to our preferred resources or core systems (data centers ect) from the guest range, but otherwise people have most functionality. What we have been seeing over the past year is an up-trend of people using the guest range to download copyright material. Our automated system will respond to complaints from outside entities and notify students they are in violation of our policies, but we do not have that ability with the guest network. Mark T. Nardone, CISSP, MIS Director of Information Technology Security Northeastern University 177:22 Huntington Boston , MA 02115 617.373.7901 (desk) 617.335.5082 (mobile) 617.373.6423 (fax)...
January 25, 2012 | Nicole Kegler
Has anyone read this article about the privacy changes being implemented by Google starting March 1? What are your thoughts? http://www.washingtonpost.com/business/economy/google-tracks-consumers-a... -- Nicole Kegler Communications Manager University Information Security Office Georgetown University 202-687-5784 Protecting data is a shared responsibility! INSTALL antivirus and antispyware software. USE strong passwords. KNOW who you are dealing with online. STORE confidential and sensitive data on encrypted devices only. SHUT DOWN computers or disconnect from the Internet when it's not in use.
February 4, 2013 | Stephen Bradley
I would also like to know about Palo Alto. My next demo in house is Enterasys then Sourcefire, Tipping Point declined to even participate in our testing for new IPS'.
January 4, 2013 | David A. Curry
Hello,

We're currently in the process of re-designing our wireless network to split it into a guest side and a "secure" side, add a guest management system, replace the captive portal sign-on with 802.1X authentication on the secure side, etc. As part of this project, we're also taking a look at our use of Network Access Control and thinking about what we're really trying to accomplish. At the moment, we use a "permanent agent" based NAC on PCs and Macs connecting to the wireless network, but the only policy we enforce is that the computer must have antivirus running with up-to-date signatures. If the connecting computer doesn't pass that check, we put it into a remediation VLAN.

Back when we first implemented NAC (this is the second product), requiring antivirus software was a major factor in keeping malware out of our network. But as we all know, it's not that simple anymore--just having antivirus isn't...
April 15, 2012 | Michael A. Schalip

Hi Folks....

Has anyone else been approached by Google Maps to allow them to "map your campus" in detail - presumably, for student navigation purposes??  Here's the "agreement" that they want us to sign off on.  I have some basic concerns, but - then again - my concerns may be completely unfounded.  So - I thought I'd offer this up to this group to see what your collective wisdom would respond with....(note the italicized entry)....

Let me know what you all think....

 

Thanks,

 

Michael

Agreement
We (the “Property Owner”, “Property Manager”, or “Property Operator”) hereby permit Google Inc. (through its employees, affiliates or agents) to enter the publicly accessible areas of the properties described above, at a time and in the manner directed by our designated...

December 8, 2011 | Michael A. Schalip

Hey Educause…..any thoughts here? 

 

We come on this discussion group for the free exchange of ideas – and THIS is allowed!?

 

Wow…..

 

From: Dennis Meharchand [mailto:dennis@valtx.com]
Sent: Wednesday, December 07, 2011 1:25 PM
To: SCHALIP, MICHAEL
Subject: RE: Michael - Patent Infringement Notice

 

Michael,

 

I think your response was bad form.

I am instructing my lawyers to file the first patent infringement lawsuit against CNM.

 

Let’s see how much of a bad publicity stunt this is.

...
March 12, 2013 | Carlos S. Lobato

Hello Colleagues,

 

At your University, what department or function is responsible for the overall administration of the PCI DSS program i.e. administrator of policy(PCI requirement 12), etc.?

 

I would really appreciate your responses.

 

Carlos

 

Carlos S. Lobato, CISA, CIA

IT Compliance Officer

 

New Mexico State University

Information and Communication Technologies

MSC 3AT PO Box 30001

Las Cruces, NM  88003

 

Phone (575) 646-5902

Fax (575) 646-5278

March 9, 2012 | Listserv Anonymous User
Message from zm23@columbia.edu

Hi All, Quick Poll Please: 1. Is your campus using, or does it plan to use, VPN access for remote users? 2 . What vendor(s) and protocols (SSL, IPSec, other) are you using? 3. How many concurrent remote users can your system support? 4. Do you offer any specialized/custom VPN services for departments, researchers, etc.? 5. Is your VPN offering part of your DR plan/requirement? Thanks! Zahid Mehmood Network Software and IT Enablement Systems Columbia University Information Technology
January 5, 2012 | Listserv Anonymous User
Message from pardonjr@purduecal.edu

Hello,

 

We are in the process of implementing whole disk encryption on our university owned laptops.  Initially, we will be using bitlocker on our Windows computers and I was looking to get some feedback from others on their experiences with roll out and management issues with this technology.

 

Thanks,

 

Jim

 

Please let me know if there is anything additional I can assist you with to ensure the service you received today has been excellent.

 

James R. Pardonek

Assistant Director...

January 30, 2013 | Carlos S. Lobato

Hello All,

 

For those PCI DSS Compliance Gurus, how do you assure University-Wide PCI DSS compliance?

 

  1. Do you ensure PCI DSS compliance for each merchant ID individually or do you take all merchant IDs for the University?
  2. If individually, do you ONLY consider those transactions for compliance purposes?
  3. How do you ensure/assure compliance for your University as a whole?  

I would really appreciate any feedback I can get from experts as Audit Committees have a tendency to ask basic compliance questions and request global assurance.

 

I would also appreciate approches used at your University to address global compliance assurance or other general opinions, comments, etc.

 

Carlos

 

Carlos S. Lobato, CISA, CIA

IT Compliance Officer

 

New...

February 27, 2012 | Listserv Anonymous User
Message from dsarazen@umassp.edu

Hi All,

 

Quick Poll Please:

 

1         Is your campus using, or does it plan to use, Two-Factor authentication for its most privileged users (e.g., system administrators logging in remotely)?

2         Do you think you should?

 

Thanks!

 

:: Daniel Sarazen, CISSP, CISA

:: Senior Information Technology Auditor
:: University Internal Audit
:: University of...

February 6, 2012 | David A. Curry
It's been a few years since this has come up on the list, so here goes.

For various administrative reasons having nothing to do with security we need to make some big changes to our self-service password reset approach, and I'm trying to capitalize on the opportunity to improve its security at the same time. At the moment, we do what (we think) many other schools do -- provide student id number, netid (username), and date of birth, and you can reset your password. The problem with this is, of course, it was never that hard to come up with that information in the first place, and the combination of students doing more and more stuff online and the growing use of social media makes it just that much easier.

So... what other approaches are you taking?

There is of course the "pick a few security questions" approach. But it's hard to come up with a set of questions whose answers aren't trivial to guess (...
November 28, 2011 | Ed Hudson

Hi All,

Polling to see how other campuses are handling DMCA take down notices. Ours has risen to a level current process is not working efficiently. We are hearing some universities are:

1) Ignoring notices from copyright holders

2) Outright blocking of file sharing as "95% are used for nefarious purposes"

Interested to see how other institutions are addressing.

Thanks

Ed

 

 

Ed Hudson, CISM
Information Security Office
California State University, Chico
http://www.csuchico.edu/isec/index.shtml
Office: (530) 898-6307
ewhudson@csuchico.edu

...

January 30, 2013 | Listserv Anonymous User
Message from jamesfurstenberg@ferris.edu

Full Disk Encryption and Media Encryption

Just wanted to see what vendors (enterprise solutions)  folks are using for FDE and MDE needs.

 We currently have Checkpoint which is very unfriendly so I am looking at options.

Any help would be greatly appreciated.  


Thank you.

Jim Furstenberg |IT Security Analyst CISSP, C|EH

"In God we trust, all others bring data."    W. Edward Demmings
_________________________________________________________
Ferris State University  - National Security Agency Center of Excellence
330 Oak St  | Big Rapids, MI 49307
Office: 231.591.5335
Mobile: 231.645.5821
EFax: 888.396.6269
Technical support
or call 231-591-4822 local
or toll free...
July 3, 2012 | Shawn Kohrman
For those of you who have self service password reset tools, do you maintain a list of users who are excluded from using the tool?  If so, how did you go about establishing your criteria?  

Shawn
-----
Shawn A. Kohrman, Security Architect

Azusa Pacific University
Information & Media Technology
901 E. Alosta Ave., PO Box 7000
Azusa, CA 91702-7000

P:  626.815.2054 | F:  626.815.2061 | http://www.apu.edu/
-----

November 17, 2011 | Listserv Anonymous User
Message from dsarazen@umassp.edu

Hi All,

 

We have some folks who’d like to see Deepfreeze installed on all lab PCs, but the IT department is balking. What do people think is the best reason to not install deepfreeze? Is there one?

 

Thanks,

 

Dan

 

 

 

 

January 3, 2013 | Listserv Anonymous User
Message from kerry.childe@tgslc.org

It’s also important to note that different states have different requirements for the content of a notification letter, so you probably want to check with your counsel’s office regarding whether your letter meets those requirements.

 

Kerry L. Childe, CIPP/US
Senior Privacy and Regulatory Counsel
TG
P.O. Box 83100
Round Rock, Texas 78683-3100
512.219.2921
800.252.9743 x 2921
kerry.childe@tgslc.org

 

ACC IT, Privacy, and eCommerce Committee Vice Chair

 

April 23, 2013 | Listserv Anonymous User
Message from will.froning@gmail.com

Hello All,

I'm wondering if any of your institutions monitor logon/logoff time for attendance/holiday/sick leave violations. I'm not looking for a technical answer, just whether or not your schools do this. 

I'm trying to bring some support documents to the table so we can make an educated decision on if it's something we want to pursue. My feeling is that this is VERY unusual for HigherED, but links to policies or an email (with a yes/no) would be much appreciated.

If you like I can compile my responses (anonymously) and repost to the list if there's any interest.

Thanks,
Will

P.S. It was great meeting some of you at the STL conference. Hopefully I can make the trip for the next one.

--
Will Froning
Unix SysAdmin
...
August 30, 2012 | Jason Youngquist

We are thinking about changing our network architecture.

 

As our network has grown and the complexity of our public facing systems and connectivity needs of those systems has increased, we are wondering what value our DMZ delivers. 

 

As an example, public facing systems in the DMZ that require access to LDAP/AD for AAA, SQL for database lookups, Exchange for mail delivery and relay, etc.

 

For those of you with non-trivial public facing systems, where do you draw the balance line between security and access?  If our most visible public facing systems (most likely to be attacked) require internal AAA & SQL access, what are we protecting? 

 

Given current system requirements and...

May 28, 2012 | Randy Marchany
Thanks to my buddy, Bryce Galbraith for this link. If you take a look at the Cybersecurity section, all of us have used these words in emails since it's our job. The link pretty much says what the topic is.

http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid-using-online-dont-want-government-spying-you.html

To my fellow conspirators who want a pork sandwich in Mexico, I salute you! This'll make sense when you read the article. :-)

-r.


Group Leaders

The University of Arizona
University of Maryland, Baltimore
EDUCAUSE

Related to this Group...

Close
Close


Annual Conference
October 15–18, 2013
Register now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center

Leadership and Management Programs

EDUCAUSE Institute
Advanced Programs
Project Management

 

Fellowships and Awards

Fellowships
Awards Programs

Getting Involved

Mentoring
Volunteer
Speak at an Event

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

From the Blogs

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2013 Strategic Priorities

  • Connected Learning
  • Enterprise IT
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.