Thursday, 23 June 2016 15:40

Give us feedback on software distribution

UAB IT is committed to making institutional and home-use software more accessible for the UAB community by simplifying the software distribution process and streamlining the approval path for fee-based orders.

There will be an opportunity for students, faculty and staff to review and provide feedback on the new software distribution design on Friday, July 8, from 1:30-2:30 p.m. in the Hill Student Center room 318.

Questions can be directed to Shira Fogel at sfogel@uab.edu or 996-6274.
A phishing email purporting to be from the "IT Service & Support Desk" has hit several email inboxes among faculty and staff at UAB.

The fake email is likely an attempt to steal user information and should be deleted. The subject line may be "Dear Employee/Staff and Student," and it asks recipients to check email access due to a maintenance update. Clicking the email takes users to a non-UAB site called "IT Security Systems Update." A copy of the email is below:

Phishing ITServiceDesk

If you receive an email with a hidden link such as “Click Here,” do the hover test. Hover your mouse over the link and look at the lower left pane to see where the link leads.

Look at the URL of the website you are visiting. 

To report suspected spam to AskIT, please follow the instructions here.

Follow these additional tips to avoid being a phishing victim:

  • Do NOT click links in messages that ask you to log in. Type a trusted Web address in your browser or Google for the Web site if you don’t know the address.
  • Never type personal, sensitive information (such as passwords or account numbers) on Web sites without verifying the Web site’s authenticity and security — look for an “https” in the address bar.
  • Verify the address. Malicious web sites may look identical to a legitimate site, but the address may use a variation in spelling or a different domain (.com vs. .edu).
  • Misspellings and grammatical errors can be a dead giveaway in phishing emails and subject lines.
  • If you are unsure whether a request is legitimate, contact the company directly. Do NOT use contact information provided in the request.
  • Don’t open attachments. They may contain viruses or malware that can infect your computer.
  • Protect your password. Information security and IT officials at both the university and UAB Hospital will never ask users for passwords or any other sensitive information.
  • Report suspicious activity. If you have any questions or you receive a suspicious email that you want to report, university employees and students can call the AskIT Help Desk at 205-996-5555. Hospital employees can call the HSIS Help Desk at 205-934-8888.
In the coming months, TechConnect — our technology store powered by UAB IT and located in the Hill Student Center — will be offering some technology products for personal purchase, such as laptops, tablets, limited accessories and fee-based support services, to faculty and staff for personal systems.

UAB IT is looking for feedback from the UAB community related to offering a payroll deduction option for these purchases to make it more convenient for employees.

To be approved to offer a payroll deduction option, UAB guidelines require a minimum of 100 persons to indicate they would utilitize the payroll deduction option. If you are interested, please fill out the survey here.
Wednesday, 25 May 2016 10:20

Security tip: Secure your devices

June CyberSecuritySign

Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history, attend to work remotely, and communicate virtually anywhere. With all these convenient features come added CyberSecurityTip Iconrisks, but here are some tips to protect your devices and your personal information.
  • Password-protect your devices. Give yourself more time to protect your data and remote wipe your devices if it's lost or stolen by enabling passwords, PINs, fingerprint scans or other forms of authentication.
  • Secure those devices and backup data. Make sure that you can remotely lock or wipe each mobile device. That also means backing up data on each device in case you need to use the remote wipe function.
  • Verify app permissions. Don't forget to review app specifications and privacy permissions before installing it.
  • Update operating systems. Security fixes or patches for mobile devices' operating systems are often included in these updates.
  • Be cautious of public WiFi hot spots. Avoid financial or other sensitive transactions while connected to public WiFi hotspots.