Top Banner
Print this page

ITM Notifications

Windows 10 Feature Update 1803

Dear Windows PC user,

A new Windows 10 version upgrade will become available for installation for all staff on July 19 via “Software Center”. Click here for instructions.

In response to earlier feedback, the timing of this upgrade can now be set by you between July 19 and September 1, 2018.

To minimize disruption and to accommodate the varied work schedules across the University, you can set this update to start at any time that is convenient. As it will download & install in the background, you can continue to work uninterrupted . It is important to note that, to complete the upgrade, you will be prompted to restart the computer.  It is strongly advised you only restart at the end of the day before you leave as the reboot cycle can take some time.

To ensure the security features of the update are implemented throughout the University, any PCs not yet updated by COB September 1, 2018 will be automatically included in a progressive rolling update schedule.

For any queries or to report any issues, please contact ITM Service Desk at servicedesk@canberra.edu.au or call ext: 5500.

Warning Message Advising Changes to Wireless Network

ITM has conducted a significant upgrade to the University’s wireless security infrastructure.

Due to this upgrade, users may receive alerts or prompts (similar to below) advising that changes to the wireless network have been detected.

ITM would like to advise users that it is safe to continue to connect, and the messages should only appear once.

If you find the messages appear more than once, please restart your computer/device and reconnect to the wireless network.

If you need further assistance, please contact the ITM ServiceDesk.

Windows network security alert

Changes to DataNow

DataNow has recently changed names to “File Director’. Shortly ITM will switch over to the new version of the software. This migration will be non-disruptive and the main change users will see is the name of the product.

The new URL to access File Director is: https://filedirector.canberra.edu.au/

The old DataNow URL (https://datanow.canberra.edu.au/) will also redirect to the new one for a period of time.

For users that have previously installed the DataNow desktop application (either Windows or Mac OS X), they are encouraged to install the latest version of the desktop application available here:

Further information can be viewed here:

https://www.canberra.edu.au/myuc-s/business-units/DVC-and-VPFI/itm/self-help/file-director

Any further questions please contact the ServiceDesk.

New Log in pages for MyUC web portals

As part of ITM’s continuing commitment to improving security for staff and students, a new Log in page (sample below) will be rolled out to key UC applications including MyUC, throughout September.

MyUC login page

For more information, please contact the ITM Service Desk at servicedesk@canberra.edu.au or call (02) 6201 5500.

ITM Advisory: Unsolicited Calls

Dear Colleagues,

ITM has recently received a number of reports pertaining to staff members receiving unsolicited phone calls and text messages specifically relating to topics such as:

  • Federal Government tax incentives
  • Baycorp debt collectors
  • Research in password management

Any unsolicited phone calls or text messages requesting users to provide valuable personal information (such as bank account numbers, passwords, credit card numbers, etc) should automatically be assumed to be FRAUDULENT.

If you have provided any personal information to a suspected scammer or require further information, please contact the Service Desk for assistance.

ITM Advisory: Managing and quarantining spam email

Dear Colleagues,

As highlighted by the recent outbreaks of ransomware (eg, the “WannaCry” epidemic), the University is constantly targeted and exposed to malicious electronic threats.

ITM are implementing changes to University email services to assist in managing and quarantining junk email traffic, spam content or suspect attachments to bolster the University’s security and privacy protective measures.

From the 6th June the University will enable filtering protocols that provide all users with a daily digest of quarantined emails.

Quarantined emails can then be reviewed for release or permanently blocked.

The digest is a summary of your messages that are on hold, and looks similar to the one below:

The digest contains a number of actions. These can be used to ensure valid messages are not missed, and can be released to your inbox.

You can either click on one of the links (discussed below) or ignore the digest if there are no emails that you are interested in.

The digest email allows you to control your mailbox by ensuring that emails from senders that you'd like to receive are allowed through, and those which you don't wish to receive are permanently blocked. When clicking on an action in the digest email, it will open up a webpage to confirm the action has been successful.

Each action is explained in the table below:

Action

Email Delivery

Future Messages

Release

Releases the message from the hold queue, and immediately delivers it to your inbox.

Messages from this sender may still be sent to the hold queue, depending on your administrator's policies and the message's content.

Block

Removes the message from the hold queue, but doesn't deliver the message to your inbox.

Messages from this sender will be immediately blocked rejected, and will not be delivered to your inbox.

Permit

Releases the message from the hold queue, and immediately delivers it to your Inbox

Messages from this sender will bypass all spam checks, and will be delivered to your inbox provided it passes virus scanning, content, and attachment policies.

Each message in the list should be actioned individually. If there are no new messages in your hold queue, you will not receive a digest notification.

If no action is chosen, you will not be reminded about these particular emails again, and the email will expire from the hold queue after a maximum of 14 days.

ITM Threat Advisory: Personal Computer infections of ransomware (known as 'WannaCry')

Extensive media coverage over the last few days has reported global and widespread outbreaks of “ransomware” computer infections.

While the primary method for this infection has yet to be confirmed, it is likely that a typical approach, through phishing emails and malicious websites, was involved.

While the University has defensive measures in place, should you receive any unexpected or suspicious emails, do not reply and do not click on attachments or any URL links in the email.

Please delete the email immediately, if you have responded to one of these emails or clicked on a link, please contact the ITM Service Desk for assistance.

Latest update from the Federal Government’s Australian Cyber Security Centre can be found at https://www.acsc.gov.au/news.html

An example of the ransom note found on infected Computers:

Example of a ransom note


Student Email Access Issues

Accessing student email via the MyUC Portal will now prompt students for credentials a second time. Email can be accessed directly by using the following URL:

www.uni.canberra.edu.au

Some students are also experiencing “invalid password” errors when accessing UC email.  

  • If your current My UC password is of minimum 8 characters and includes both upper and lower case characters, numbers and a special character please delete the browser cache and cookies and then reattempt to access the student email.
  • If this does not resolves the issue or if your current password does not meet the password complexity requirement of being minimum of 8 characters including both upper and lower case characters, numbers and a special character (eg $ - ! / = _), please attempt a self-password reset via the following link:

https://www.canberra.edu.au/myuc-u/my-access/change-password.

NOTE: Please allow 15 minutes for synchronization before attempting to access student email.

Should the above self-reset not resolve the issue kindly contact the ITM ServiceDesk on 62015500 or at servicedesk@canberra.edu.au for further resolution.

We apologies for the inconvenience caused.

Email Security Enhancements

With increasing frequency, the university is the target of fraudulent and deceptive email practices.

Malicious messages have been faked from the “@canberra.edu.au” domain and sent to UC staff and students in an attempt to commit identity / financial fraud and to install malicious software by deception.

To reduce the scale of these attacks UC is implementing tighter controls around email services.

Once implemented, any email not genuinely originating from the “@canberra.edu.au” or “@uni.canberra.edu.au” email servers will be blocked from delivery to UC.

These controls will permanently stop any non-UC email server from sending emails using the “@canberra.edu.au” or “@uni.canberra.edu.au” email domains.

Please contact the service desk if you are the administrator of a service or process that is sending legitimate messages to either “@canberra.edu.au” or “@uni.canberra.edu.au” from external email servers.


Outage Details

Affected Service From To
Various services Every Thursday, 10:00 pm Every Friday, 3:00 am
Maintenance window - network Every Thursday, 6:30am Thursday 8:00am

Various Services

As part of ITM's ongoing maintenance programs to ensure IT services are secure and performing optimally, below windows are scheduled.

  • Every Thursday, 10:00pm - Every Friday, 03:00am (5 hours)

During these maintenance windows various IT related services may be interrupted for periods of 15-20 minutes. Please note that no individual service will be unavailable for the entire duration of the maintenance window.

Services that may be affected include:

  • file Shares – corporate shared drives and home drives
  • email/calendar
  • corporate applications
  • University websites
  • printing services

ITM Advisory: Unsolicited Email

Dear Colleagues,

An example of a recent email targeting staff is shown below (links have been removed). If you received this email, or one like it - do not reply and do not click on any URL links in the email. Please delete the email immediately. If you have responded to one of these emails or clicked on any link, please contact the Service Desk for assistance.

Any unsolicited email requesting users to click on links must automatically be assumed to be FRAUDULENT, and should be deleted immediately.

Back to top