VPN / Pulse Secure Client upgrade feature

Starting Tuesday October 11, the campus VPN will check to see if you have the latest version of the Pulse Secure client software on your MAC or Windows system, when you log into the VPN.

If you have a version older than the current (5.2.5), you will be prompted to upgrade it.  Once upgraded, you will need to connect to the VPN again.

To learn more, click here.

For assistance, please contact the IT Service Desk at 978 934 4357.

Take 5 minutes to secure your account and ensure your privacy with Google.

Google has a set of online tools available for quickly checking and modifying your account settings.

Start by going to myaccount.google.com where you can manage “Sign-in & security”, “Personal info & privacy” and ‘Account Preferences”. Towards the bottom of the page, you can “Get Started” with a  “Security Checkup” which will walk you through setting recovery options, checking connected devices and account permissions. The “Privacy Checkup” tool will show you what you have shared using your Google+ profile and the types of information collected to personalize your Google experience. Settings include allowing people to search for your name, number and other information, photo settings including geographic locations and managing web & app activity.

Be sure to take some time to review what Google collects and what you want made available for people to see. You might be surprised what you find as your existing settings!

Yes Virginia, you do need antivirus software for your Mac

If you’re one of those people who think their Mac is absolved from getting viruses, think again.  According to this analysis at Bit9, in 2015 alone researchers have discovered five times the amount of unique OS X malware than in the last five years combined.  Makes perfect sense due to the growth in popularity of Macs in the business and at home.

Information Technology reminds everyone that all users are required to install an antivirus program on their computers, regardless of the computers’ operating systems. IT offers McAfee VirusScan software for free to all UMass Lowell students, faculty, and staff.  Check out the software applications page on the IT website for more information.

I have a firewall – am I good?

Firewalls are one of the many components defending our networks and computers from unwanted connections. But how do they help keep us secure? Imagine a firewall as a building with many doors. Each door controls access to a particular service on your computer.  For example, hosting a web page or running a database on your computer would be a legitimate service.  If you would like people outside the building to view your web page, you would need to open the door controlling access to that particular service.  Conversely, preventing unwanted outside connections to your database means you need to shut the door controlling access to that service. This type of control prevents people from just wandering in and connecting to any open service on your computer.  Keep in mind that people inside the building can come and go as they please.

So how do the bad guys manage to get in if the doors are closed?

  • Laptops or other portable devices coming into the house may carry infections that can open a door from the inside
  • Unauthorized Wi-Fi access points can open a backdoor into the house
  • Malicious code in a smartphone app can be hidden in legitimate services that can execute when brought back inside the house
  • Unpatched services that have an open door can be exploited to allow additional levels of access
  • People opening their email inside the house can release a virus infecting them or the rest of the building

To make it more difficult for hackers from gaining access, additional defense mechanisms such as anti-virus, anti-spam, and patching your computers are used in conjunction with the firewalls.  Employing various technologies such as these is known as Defense in Depth, and it helps to head off the intruders whenever they manage to find an opening.

So while firewalls may be considered our first line of defense, they are by no means our only tool in the security toolbox to help keep us secure.