Duo announced it is changing its look and will add some new features as of March 30. The familiar two-factor prompt you see when logging in to important CWRU web applications will be phased out in the coming weeks, and replaced with Duo’s new Universal Prompt, which has a more minimalist look. The traditional prompt will continue to work, but will be phased out gradually to prevent any interruption to CWRU services.
UTech offers help with antivirus protection.
As part of the Acceptable Use Policy, all machines accessing the CWRU Network must have antivirus software installed and running.
Case Western Reserve University partners with Kuali Foundation, Inc. to provide business continuity planning software to the university community. Known as CWRU Ready, this web-based software is designed to help campus departments create plans for continuity of operations in the event of a disaster or emergency situation.
CWRU Ready is the business continuity planning solution on campus. This article highlights critical functions and other items.
This article highlights key resources in CWRU Ready as well as how to manage plans.
This article highlights building plans and action items in CWRU Ready.
When removing a computer from service, the current procedure is to follow the steps listed on Information Security’s Media Sanitization Procedure page.
If you are using macOS or iOS devices and blank screen is displayed instead of DUO Prompt choices, it means your Content Restriction is blocked the DUO prompt content. Disabling content restriction should resolve the issue.
This article highlights how to enroll an Authentication Device in DUO Security.
Two-factor authentication is available for active faculty, staff and students at Single Sign-on, and is required for a variety of systems including Human Capital Management (HCM), Financials (FIN) and Virtual Private Network (VPN) system log-ins.
Two-factor authentication enhances the security of your account by using a secondary device to verify your identity. This prevents anyone but you from accessing your account, even if they know your password.
Phishing is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank, eBay, etc.). These messages urge you either to reply with your user name and password or to click on a hyperlink that takes you to a bogus website where you are asked to input private information (e.g., password, credit card, or other account updates).
Phishing is a common email-based attack used by cyber criminals to steal information from you. A phishing email pretends to be from someone or something you know or trust, such as your bank or your favorite online store, then tries to entice you into taking an action, such as clicking on a link, opening an attachment, or responding to a message.
CWRU has an overall UTech policy management process that is the driving factor for information technology usage and management. The policy implementation is performed in conjunction with other areas of the University.
Rave is a text and voice messaging alert system that is used only in the case of imminent danger or a serious threat to the campus community. Rave is also used to notify the CWRU community of campus closings due to severe weather. In case of a major campus emergency, Case Western Reserve University will utilize the Rave text and voice messaging alert system, among other methods of communicating with faculty, staff and students.
The types of information listed below are examples of Restricted Information, which is confidential, and if disclosed, has the highest impact on in the university. Use of Restricted Information carries the burden of extensive management controls, known as Tier III Controls, to protect the confidentiality of the information, the information systems that contain it, and the data storage mechanisms where it is stored. By definition, this level of information is not to be shared without proper agree
Securing your computer is an important step in preventing intruders from stealing valuable information stored there such as credit card and bank information as well as ID and passphrase data. In addition, some thieves can also access your computer's resources such as hard disk space, your processor and your Internet connection.
In the event a computer is lost or stolen at CWRU, it is important to first contact Campus Police at 216.368.3333. They will assist the owner in filing a police report and in attempting to locate the stolen device.