Cyber Security Awareness Month

Information Security

Mission Statement

The Information Security Office is committed to lowering the risk profile of the University’s electronic information by implementing industry best practices to protect the confidentiality, integrity, and availability of student, faculty, and staff information. We uphold the University’s compliance obligations by developing information security policies, providing security awareness training, and overseeing the implementation of strategic information security initiatives.

Take Care, Be Cyber Aware

Fingerprint on top of computer screen

While space travel for the public may still be years away, virtually all of us live in cyberspace now.  Whether it’s checking social media on your phone or sending emails at work, our lives are dominated by digital technology, making us more productive but also more vulnerable to cybercrime.

October is National Cybersecurity Awareness Month, and the University of South Alabama wants to take advantage of this by reminding students, faculty and staff how to protect themselves online.

“We want people to challenge themselves to learn something new about cybersecurity,” said Brandon Morris, information security specialist at USA’s Computer Services Center. “We take for granted that the services and sites we use online are secure and while that may be typically true, it's important that we take the initiative and do our part.”

Read Full Article

Cyber Security Alerts

▼   Windows CryptoAPI Spoofing Vulnerability

What is being exploited?
Vulnerability in Windows CryptoAPI that allows malicious executables using a spoofed code-signing certificate to appear as if it was from a trusted source.

What does this affect?
Attackers can conduct man-in-the-middle attacks and decrypt confidential information on user connections to spoofed software that appears legitimate.

Which Operating Systems does this affect?
Windows 10, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0601

▼   Windows Remote Desktop Gateway Remote Code Execution Vulnerability

What is being exploited?
Vulnerability in Windows Remote Desktop Gateway (RD Gateway) that allows specially crafted requests to execute arbitrary code on the target system.

What does this affect?
Attackers can gain access to the target system with full user rights that would allow them to install programs; view, change, or delete data; or create new users.

Which Operating Systems does this affect?
Windows Server 2012, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0609 & CVE-2020-0610

▼   Remote Desktop Client Remote Code Execution Vulnerability

What is being exploited?
Vulnerability in Windows Remote Desktop Client that allows the server to execute arbitrary code on the target system after an unsuspecting user connects to it.

What does this affect?
Attackers can trick the user into connecting to a compromised server and gain access to the target system with full user rights that would allow them to install programs; view, change, or delete data; or create new users.

Which Operating Systems does this affect?
Windows 7, Windows 8, Windows 10, Windows RT, Windows Server 2008, Windows Server 2012, Windows Server 2016, and Windows Server 2019

How to mitigate this?
Apply critical patches to affected systems as soon as possible.

For more information:
CVE-2020-0611

▼   Checking for Windows Updates

Windows 10 & Windows Server 2016 and newer
1. Search: Check for Updates

2. Click “Check for Updates” then install all updates

Windows 8 and older & Windows Server 2012 and older
1. Navigate: Control Panel > System and Security > Windows Update

2. Click “Check for Updates” then install all updates

 

Cyber Security News

Cyber Security Video of the Month