RSS Feed
Latest Updates
Dec
2
ALERT: Mozilla Firefox Vulnerability - Update Immediately!
Posted by Joey Noble on 2016-December-02 10:16 AM

A severe vulnerability affecting Firefox was disclosed late on Tuesday 29 Nov. 2016.  This vulnerability allows arbitrary remote code execution using the browser. It is recommended that you update your Firefox application immediately using the following instructions:

  • Windows OS – Open Firefox and click on the three bar icon at the top right of the browser window. Select Options and Advanced. Enable Automatically install updates. Relaunch browser.
  • Mac OS – Open Firefox and then from the top navigation menu select Firefox > Preferences and Advanced. Enable Automatically install updates. Relaunch browser.

 After upgrading, you should be using version 50.0.2.


Read more »



Nov
18
VCU Alert Desktop Alert Client Deployment
Posted by Joey Noble on 2016-November-18 09:53 AM

Starting Friday, Nov. 18, 2016, Windows-based VCU computers (laptops, desktops, etc.) will begin receiving on screen emergency alerts when an active, imminent and life-threatening situation exists that impacts the Monroe Park and/or MCV Campus. VCU's LiveSafe users will also receive an emergency alert message through the cell phone app. These new notifications are part of VCU’s multi-channel system for communicating emergency information to students, faculty, staff, visitors and the community. Other channels include sirens along with text messages, Alertus boxes, mass email, digital signs, social media and VCU website information.

The VCU Alert Alertus desktop client software will be deployed on Friday, November 18th, via a GPO. The GPO will be at the top level OU of the Rams domain. All domain joined Windows desktop computers (not servers) will receive the software package. Current Mac users may install the Alertus Desktop client manually using the link below. All new laptops (Mac/Windows) will have the Alertus Desktop Client pre-installed.

For more information, please visit https://www.ts.vcu.edu/software-center/security/alertus/


Read more »



Nov
4
SOM Google Drive Account
Posted by Joey Noble on 2016-November-04 12:01 PM

All School of Medicine (includes VIPBG) faculty and staff will be provisioned a VCU Google Drive account. Google Drive, along with the associated productivity applications (Sheet, Docs, Slide, etc.), will allow you to seamlessly collaborate with VCU and external colleagues.  Google Drive will also provide all SOM faculty and staff with a secure and approved cloud storage platform to store files.

Once your SOM Google Drive Account has been created you will receive an email notification from Doctor Gee detailing how to access your account. More information and accessing your account may be found at http://go.vcu.edu/SOMDrive.


Read more »



Sep
19
Mac OS Sierra Upgrade Notice
Posted by Joey Noble on 2016-September-19 09:37 AM

Sierra is the latest Mac OS to be released publicly on Sept. 20, 2016. In collaboration with SOMTech and to comply with recent VCU IT audit results, VIPBG IT is requesting that user DO NOT upgrade any VCU systems with Sierra. Failure to comply with this request may cause applications to malfunction including the breaking of encryption which could result in the loss of your data or render your system inoperable or both.

If you receive notifications from Apple to upgrade to Sierra, DO NOT accept! Once SOMTech has properly tested Sierra in VCU’s academic environment, VIPBG IT will notify through the listserv instructions for upgrading your system.

 Please note:  New Mac systems shipped after Sept. 20, 2016 may come pre-installed with Sierra and will be held until the vetting process has ended. Because of this, new Mac orders should be delayed until after SOMTech has approved the use of Sierra.


Read more »



Jul
21
Large Scale Ransomware Campaign Reported
Posted by Joey Noble on 2016-July-21 08:38 AM

VCU InfoSec was recently made aware of a large scale ransomware campaign aimed to deliver the Locky ransomware to enterprise victims via email. The malicious emails will typically have a spoofed sender's address of copier@domainname.extension (e.g. copier@vcu.edu, copier@google.com), and contains a Microsoft Word document with a macro extension (docm file). If the victim opens the document and executes the macro, the Locky ransomware will then be downloaded and proceed to encrypt the victim's computer and network drives. VCU InfoSec is actively monitoring this situation as it develops. Please DO NOT open attachments from email addresses you do not recognize or that appear suspicious.


Read more »




Help Desk Software by Kayako