Union College

518-388-6293 | its@union.edu

Alerts

06.10.2017 | Scheduled Panopto Maintenance

On Saturday, June 10, Panopto will be upgraded to Panopto 5.4. Services will be offline from 8:00pm to 12:00am EDT. During this period of time, you will not be able to access recordings and any attempts to upload from clients will result in a "Server unable to connect" message.

06.15.2017 | Nexus Scheduled Outage for Planned Upgrade

On Thursday, June 15, Nexus will be upgraded to version 3.2 to improve functionality and enable new features for your use this Fall term. Services will be offline from 6:00 am to 9:00 pm EDT. During this period of time, you will not be able to access the system.

Enterprise System Maintenance

Tuesday, 4:00 am - 8:00 am

Wednesday, 4:00 am - 8:00 am

Thursday, 4:00 am - 8:00 am

Sunday, 6:00 am - 12:00 pm

Enterprise Systems may be unavailable during these times.

29

May

   
   
S M T W T F S
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
10
 
11
 
12
 
13
 
14
 
15
 
16
 
17
 
18
 
19
 
20
 
21
 
22
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
31
 
 
 
 

Security Tips

05.4.2017

ITS has identified a serious email threat circulating on campus.  The subject line of the version we have seen include “shared a document on Google Docs with you” and includes different names of people.  It could be from someone you know.  It contains a link to malicious software.  If you opened the message and entered your username and password in and/or saw the following screen and clicked on “Allow”, It is important that you contact the Help Desk (call 518.388.6400 or email 

04.12.2017

ITS has become aware of a vulnerability in Microsoft Word.  The vulnerability affects all versions of Windows operating systems.  Opening an infected Microsoft Word file from an untrusted source installs malware and potentially compromises your entire system.
Do not open or download Word files from any untrusted source or that appears suspicious. 

12.2.2016

ITS has become aware of a serious email phishing scam circulating on campus.  The subject line of the versions we have seen include “Urgent Request” and “Payment Request”.    The email looks like it is coming from a person (usually from within your department) at Union with the union.edu address.  In actuality the message is spoofing your colleague’s email address to make it look more authentic.     The email asks you to process a payment to a vendor or some pending invoices need to be servic

02.23.2016

ITS has become aware of a serious telephone scam.  A person calls on the phone asking how the printers are working and offering toner supplies.  The person has the name of the person being called and confirms that he wanted to call Union College in NY.  He will state that the college has a contract with the company.  The caller ID is anonymous.  Please DO NOT give out any information.

01.28.2016

PLEASE DO NOT CLICK ON THE LINK IN THE MESSAGE YOU RECEIVED TODAY FROM Philip Wajda.  His account was compromised and used to send out phishing messages.  PLEASE DELETE HIS EMAIL.  

01.22.2016

ITS has identified a serious email threat circulating on campus.  The subject line of the version we have seen include “Verify it’s you” and it contains a link to malicious software.  ITS blocked the email address and the website.
Please DO NOT click on any links in these emails and avoid opening these types of messages if possible.  Delete them.
If you require assistance or have any questions, please contact the ITS Help Desk (call 518.388.6400 or email helpdesk @union.edu)

09.26.2014

This is notification that a new and serious security vulnerability known as the “Bash Bug” (or Shellshock) is threatening Unix and Linux systems, as well as systems running Mac OS X.  Using the “Bash Bug” vulnerability, attackers can potentially take over the computer’s operating system, access confidential information, make changes, etc.
PLEASE NOT THAT WINDOWS-BASED SYSTEMS ARE NOT AFFECTED.

05.5.2014

Security researchers have discovered a vulnerability, “Covert Redirect” flaw, that can masquerade as a log-in popup based on an affected site’s domain. For example, someone clicking on a malicious phishing link will get a popup window in Facebook, asking them to authorize the app. Instead of using a fake domain name that is similar to trick users, the Covert Redirect flaw uses the real site address for authentication.

04.30.2014

The US Computer Emergency Readiness Team (CERT) is advising that those using Internet Explorer temporarily use a different browser (Firefox or Chrome) until this latest vulnerability is patched.   We understand that certain Union College sites and affiliated sites may require the use of Internet Explorer, please limit your use of Internet Explorer to these sites.  All other web browsing should be done with Firefox or Chrome as visiting an infected site would allow malicious users to install m

04.18.2014

Security researchers have discovered a vulnerability, named the Heartbleed bug, in many online encryption systems used around the world (OpenSSL encryption).  This vulnerability affects the security of servers which handle encryption between computers, like when you connect using https to banking websites and a majority of websites where you are using passwords and private data.

Pages

Subscribe to Security Tips

Need Help?

  • helpdesk@union.edu
  • Help Desk (6400)
  • MyResnet (Apogee) 855-813-7010
  • Electronic Classroom Hotline (7007)
  • Telecom Help (6411)
  • Hours: M-F 8:30-4:54

Submit A Request

Where We Are

Location map