Changes to DataNow
DataNow has recently changed names to “File Director’. Shortly ITM will switch over to the new version of the software. This migration will be non-disruptive and the main change users will see is the name of the product.
The new URL to access File Director is: https://filedirector.canberra.edu.au/
The old DataNow URL (https://datanow.canberra.edu.au/) will also redirect to the new one for a period of time.
For users that have previously installed the DataNow desktop application (either Windows or Mac OS X), they are encouraged to install the latest version of the desktop application available here:
- Windows: http://www.canberra.edu.au/moe/filedirectorclient/File_Director_220.127.116.11_x64.msi
- Mac OS X: http://www.canberra.edu.au/moe/filedirectorclient/FileDirector_MacOS_4.0.zip
Further information can be viewed here:
Any further questions please contact the ServiceDesk.
Due to scheduled maintenance, all University of Canberra payment pages (Onestop pages) will not be available on Wednesday 8th November, 2017 from 10:00 AM to 2:30 PM (AEDT). For further information, please email Service Desk at email@example.com or call (02) 6201 5500.
New Log in pages for MyUC web portals
As part of ITM’s continuing commitment to improving security for staff and students, a new Log in page (sample below) will be rolled out to key UC applications including MyUC, throughout September.
For more information, please contact the ITM Service Desk at firstname.lastname@example.org or call (02) 6201 5500.
ITM Advisory: Unsolicited Calls
ITM has recently received a number of reports pertaining to staff members receiving unsolicited phone calls and text messages specifically relating to topics such as:
- Federal Government tax incentives
- Baycorp debt collectors
- Research in password management
Any unsolicited phone calls or text messages requesting users to provide valuable personal information (such as bank account numbers, passwords, credit card numbers, etc) should automatically be assumed to be FRAUDULENT.
If you have provided any personal information to a suspected scammer or require further information, please contact the Service Desk for assistance.
ITM Advisory: Managing and quarantining spam email
As highlighted by the recent outbreaks of ransomware (eg, the “WannaCry” epidemic), the University is constantly targeted and exposed to malicious electronic threats.
ITM are implementing changes to University email services to assist in managing and quarantining junk email traffic, spam content or suspect attachments to bolster the University’s security and privacy protective measures.
From the 6th June the University will enable filtering protocols that provide all users with a daily digest of quarantined emails.
Quarantined emails can then be reviewed for release or permanently blocked.
The digest is a summary of your messages that are on hold, and looks similar to the one below:
The digest contains a number of actions. These can be used to ensure valid messages are not missed, and can be released to your inbox.
You can either click on one of the links (discussed below) or ignore the digest if there are no emails that you are interested in.
The digest email allows you to control your mailbox by ensuring that emails from senders that you'd like to receive are allowed through, and those which you don't wish to receive are permanently blocked. When clicking on an action in the digest email, it will open up a webpage to confirm the action has been successful.
Each action is explained in the table below:
Releases the message from the hold queue, and immediately delivers it to your inbox.
Messages from this sender may still be sent to the hold queue, depending on your administrator's policies and the message's content.
Removes the message from the hold queue, but doesn't deliver the message to your inbox.
Messages from this sender will be immediately blocked rejected, and will not be delivered to your inbox.
Releases the message from the hold queue, and immediately delivers it to your Inbox
Messages from this sender will bypass all spam checks, and will be delivered to your inbox provided it passes virus scanning, content, and attachment policies.
Each message in the list should be actioned individually. If there are no new messages in your hold queue, you will not receive a digest notification.
If no action is chosen, you will not be reminded about these particular emails again, and the email will expire from the hold queue after a maximum of 14 days.
ITM Threat Advisory: Personal Computer infections of ransomware (known as 'WannaCry')
Extensive media coverage over the last few days has reported global and widespread outbreaks of “ransomware” computer infections.
While the primary method for this infection has yet to be confirmed, it is likely that a typical approach, through phishing emails and malicious websites, was involved.
While the University has defensive measures in place, should you receive any unexpected or suspicious emails, do not reply and do not click on attachments or any URL links in the email.
Please delete the email immediately, if you have responded to one of these emails or clicked on a link, please contact the ITM Service Desk for assistance.
Latest update from the Federal Government’s Australian Cyber Security Centre can be found at https://www.acsc.gov.au/news.html
An example of the ransom note found on infected Computers:
Student Email Access Issues
Accessing student email via the MyUC Portal will now prompt students for credentials a second time. Email can be accessed directly by using the following URL:
Some students are also experiencing “invalid password” errors when accessing UC email.
- If your current My UC password is of minimum 8 characters and includes both upper and lower case characters, numbers and a special character please delete the browser cache and cookies and then reattempt to access the student email.
- If this does not resolves the issue or if your current password does not meet the password complexity requirement of being minimum of 8 characters including both upper and lower case characters, numbers and a special character (eg $ - ! / = _), please attempt a self-password reset via the following link:
NOTE: Please allow 15 minutes for synchronization before attempting to access student email.
Should the above self-reset not resolve the issue kindly contact the ITM ServiceDesk on 62015500 or at email@example.com for further resolution.
We apologies for the inconvenience caused.
Email Security Enhancements
With increasing frequency, the university is the target of fraudulent and deceptive email practices.
Malicious messages have been faked from the “@canberra.edu.au” domain and sent to UC staff and students in an attempt to commit identity / financial fraud and to install malicious software by deception.
To reduce the scale of these attacks UC is implementing tighter controls around email services.
Once implemented, any email not genuinely originating from the “@canberra.edu.au” or “@uni.canberra.edu.au” email servers will be blocked from delivery to UC.
These controls will permanently stop any non-UC email server from sending emails using the “@canberra.edu.au” or “@uni.canberra.edu.au” email domains.
Please contact the service desk if you are the administrator of a service or process that is sending legitimate messages to either “@canberra.edu.au” or “@uni.canberra.edu.au” from external email servers.
|Various services||Every Thursday, 10:00 pm||Every Friday, 3:00 am|
|Maintenance window - network||Every Thursday, 6:30am||Thursday 8:00am|
As part of ITM's ongoing maintenance programs to ensure IT services are secure and performing optimally, below windows are scheduled.
- Every Thursday, 10:00pm - Every Friday, 03:00am (5 hours)
During these maintenance windows various IT related services may be interrupted for periods of 15-20 minutes. Please note that no individual service will be unavailable for the entire duration of the maintenance window.
Services that may be affected include:
- file Shares – corporate shared drives and home drives
- corporate applications
- University websites
- printing services
Critical Information for ECHO360 (lecture recording) users
Dear Academic Colleagues,
Following on from earlier notifications, if your lectures are recorded, please note that your Echo360 recordings are no longer accessible unless you actioned the points below:
From now on students in a Moodle unit will only be able to access recordings that are organised in the EchoServer course/section linked to that Moodle unit/offering.
The only two ways a student can replay the recording will be by using the "EchoCenter block" or the new "EchoLink" Moodle resource. Links added using the Moodle "Add URL" will not work.
In order to provide access to Echo recordings you must:
* Establish your Moodle unit and add the Echo block (see step 3 on http://learnonline.canberra.edu.au/mod/book/view.php?id=6308…)
* Confirm that your lectures are listed in the university timetable (see the Checking the timetable section of http://learnonline.canberra.edu.au/mod/book/view.php?id=6308…
* Check that the EchoServer course/section has been linked to the your Moodle unit site (see step 4 of http://learnonline.canberra.edu.au/mod/book/view.php?id=6308…
You can use the new EchoLink Moodle resource to create a link to a specific recording within the body of your Moodle unit.
To do this Turn Editing On then add the EchoLink resource and follow the prompts (see more information at http://learnonline.canberra.edu.au/mod/book/view.php?id=6308…)
This change to access through an authenticated pathway is required to enable access to accurate information about the way students replay Echo recordings, including a usage heatmap.
More information on Echo360 is available in the Echo360 section of the LearnOnline staff help site at http://canberra.edu.au/learnonline-staffhelp and http://learnonline.canberra.edu.au/mod/book/view.php?id=630812&chapterid=15622
ITM Advisory: Unsolicited Email
An example of a recent email targeting staff is shown below (links have been removed). If you received this email, or one like it - do not reply and do not click on any URL links in the email. Please delete the email immediately. If you have responded to one of these emails or clicked on any link, please contact the Service Desk for assistance.
Any unsolicited email requesting users to click on links must automatically be assumed to be FRAUDULENT, and should be deleted immediately.