Category Archives: Campus Announcements Archive

Changes coming to [External Email] labeling 

In March 2018, ITS implemented a change within the University’s email system, placing a label at the top of the message body for all emails coming from non-Drake senders. Designed to help recipients pay attention to the source of incoming messages and reduce the likelihood of compromise, it has made a noticeable difference in our security awareness efforts.

Over time, however, the label has become increasingly inconspicuous, and we’ve received feedback that it blends in with the email body.

On July 7 we’ll be updating the look of the label with different wording and color for better prominence. Examples of the new label are shown below.

As a reminder, email labeling is an automated process that does not examine message content, only the message sender. This labeling does not indicate whether a message is malicious, it just informs recipients that message is not from a Drake sender. Every email you receive, especially those from unknown senders and/or containing links or attachments should be carefully reviewed before acting.

Please contact me with any questions, at informationsecurity@drake.edu.

— Peter Lundstedt, ITS

We are all targets for cyber-attacks

Many people mistakenly believe they are not a target for cyber attackers: that their data or accounts are not valuable. This could not be further from the truth. If you use technology, at work or at home, you are a worthwhile target. But you also have the best defense there is against these attacks–you. 

Why they target us 

Attackers have different motivations and believe that by hacking you they can achieve their goals. Here are two common examples of types of attackers and why they target us: 

Cyber Criminals: They are motivated by money, and the internet ensures they can easily target a broad audience. There are MANY ways they can make money from you including 

    • stealing money from your bank or retirement accounts 
    • creating a credit card in your name and billing you  
    • using your computer to hack other people 
    • hacking your social media or gaming accounts and selling them  

Targeted Attackers: These are highly trained cyber attackers, often working for governments or criminal syndicates. You may feel your job would not attract much attention, but you would be very surprised. 

    • The information you handle at Drake has tremendous value.  
    • You may be targeted to get to a colleague or system you access. 
    • They may target you because of organizations Drake works or partners with. 

The myth: I use an antivirus tool, I’m safe 

Our suite of security tools prevents these attacks from being successful, right? Unfortunately, that’s not always true. Cyber attackers constantly improve their methods to bypass detection and protection technology. If they create new malware, it can spread undetected. Customized phishing attacks bypass email filters, and phone calls can trick you out of your credentials or money. Technology plays an important role in protection, but YOU are the best defense. 

Slow down and take a close look at emails that are particularly urgent, odd, or suspicious. Use a strong, unique passphrase for each of your accounts. Staying cyber-aware is ultimately your best defense.  

I invite you to email informationsecurity@drake.edu to continue this conversation or to report any suspected attacks. ITS will continue to provide phishing education in July using simulations of common attack methods. 

—Peter Lundstedt, ITS 

 

New Diversity, Equity, and Inclusion website

Check out the new Diversity, Equity, and Inclusion website! Over the past six months various stakeholders around campus have worked to update our equity and inclusion website to include more data, more stories, and more resources for our community. You can find the new page under the about tab at Drake.edu, in the footer of the Drake.edu homepage, or under campus links. The new site features a comprehensive timeline of equity and inclusion milestones at Drake and data about our community. You can also visit the site to see how you can get involved or check on updates around strategic initiatives.

–Erin Lain, Office of the Provost

Summer program for high school students interested in health careers

The College of Pharmacy and Health Sciences’ BullD.O.G.S. (Drake Opportunities for Gaining Skills) in Healthcare program will take place July 25–27 on Drake’s campus. All high school students in grades 10–12 during the 2019–2020 academic year are welcome to attend.

BullD.O.G.S. in Healthcare introduces students to careers in healthcare by educating them on opportunities in health sciences and inspiring them to explore different pathways.

Students will participate in hands-on laboratory experiences, educational sessions, and interactive discussions with students and faculty in the College of Pharmacy and Health Sciences to understand how to best prepare for a career in healthcare. A special emphasis is placed on promoting careers in athletic training, occupational therapy, and pharmacy.

The overarching goal of the program is to expose students to a wide variety of healthcare opportunities and educate them about how they can best prepare for a career in the health professions.

If you know of a high school student interested in a career in healthcare, please encourage them to register. Registration closes Friday, July 5, 2019 at 12 p.m. Due to the costs involved in providing an overnight experience on campus, there is a $200 registration fee. Financial assistance may be available to students who qualify. Payments will be accepted through Friday, July 5 at 12 p.m. Participants who have not paid the registration fee by this date will forfeit their spot in the program. Refunds will not be granted for cancellations made after July 5.

For more information about the program’s goals, activities, and requirements, visit the College of Pharmacy and Health Sciences website, or contact Jessica Lang, Director of Enrollment Services, at jessica.lang@drake.edu or 515-271-3018.

Reminder: Lynda.com Access Ends June 30

Please note that due to a significant price increase, our campus membership to Lynda.com will end on June 30.

Until then, you’ll be able to continue accessing all training, but beginning on July 1, access will be unavailable.

Looking for online tech resources? Check out the Technology Training Resources for Faculty & Staff and Technology Training Resources for Students guides in the IT service portal. These guides have curated links to help you use campus technology more effectively.

Can you spot an impostor?

Can you spot an impostor?

If someone claiming to be your supervisor, director, or dean sent you an email from an unrecognized address with a one-word question, would you respond? These attacks are surprisingly effective, taking advantage of our trust and the way we interact with our colleagues. It’s also extremely difficult for security technologies to stop these attacks because there are no infected email attachments or malicious links to detect.

How does the attack work?

In most cases, the criminals are after money, and what makes these attacks so dangerous is the research they do prior to launching their attack. For example, if they are targeting you, they would determine the identity of your department chair or manager. Then they’ll craft a series of urgent emails pretending to be them and asking you to take an action such as wiring money, purchasing gift cards, or sending a sensitive document, always outside an established process.

Protecting yourself

Common sense is your best defense. Here are some clues to watch for if you get an email that you suspect might be from an imposter:

    • The email will be very short (potentially just a few words).
    • There’s a strong sense of urgency, pressuring you to ignore or bypass standard practices. You should always follow established procedures, even if the email appears to come from leadership or administration.
    • The email is work-related but comes from a non-Drake email address, like gmail.com or hotmail.com. These emails will nearly always have an [External Email] label.
    • The email appears to come from a leader, co-worker, or vendor you know or work with, but the tone seems different.
    • Payment instructions are provided, but differ from ones you may have already received, such as payment to a different bank account.

If you receive a request that appears to be from an impostor, stop all interaction with them and report the message by emailing it to informationsecurity@drake.edu or submitting a request at service.drake.edu/its. ITS will continue to provide phishing education in June using emails that simulate real attacks.

—Peter Lundstedt, IT Communications

 
Here’s what an attack targeting ITS might look like

Meet and Greet with the 2019 Lorentzen Student Hatchery Cohort

The Drake University Entrepreneurship Centers invites you to join us from 4–6 p.m. on Tuesday, June 11, at Curated Growth (Southridge Mall) to meet the 2019 cohort of the Lorentzen Student Hatchery. This year, we have seven student businesses and look forward to introducing them to you!

The Lorentzen Student Hatchery is a unique program aimed at fostering student startups for students of any major. Entrepreneurship Centers staff provides guidance and support, access to mentors and experts, and more to students accepted to the Hatchery.

–Stephanie Cardwell, College of Business and Public Administration

MyDUSIS Planned Outage on Friday, June 7 from 5–6 a.m.

MyDUSIS will be unavailable on Friday, June 7 between 5–6 a.m. while ITS applies a critical security patch. During this brief window, all MyDUSIS functionality (including time sheets, leave reports, degree audits, and viewing grades) will be unavailable.

We appreciate your patience while we perform this necessary work. If you continue to have any issues after the planned maintenance window, please contact the Support Center at 515-271-3001 or visit service.drake.edu/its to report your issue.

–Carla Herling, Information Technology Services