Information Security

Beware of Phishing Attempts! Global Computer Incident

We are writing to inform you of an important matter concerning a global computer incident that is occurring today. The incident has affected millions of Windows computers worldwide. Cyberattackers are taking advantage of this situation by posing as Service Desk staff, Microsoft, or CrowdStrike employees and contacting members of the University community. Their goals appear to be to gather University computer credentials or deploy ransomware on devices. In light of this, we are asking members of the University community to take precautions:

1. Do not share passwords: IT will never ask for your passwords or Multi-Factor Authentication (MFA) credentials. If you receive any communication requesting this information, do not respond or provide any details.

2. Be vigilant: If you receive suspicious emails, calls, or messages claiming to be from IT Services, Microsoft, or CrowdStrike, do not engage or respond.

3. Report issues promptly: If you are experiencing problems related to today’s incident or suspect any fraudulent activity, please contact your local desktop support staff, visit the TechBar (Regenstein Library), or for an online support response, please submit a request to the IT Services Self Service Portal.

 

How can we help you?

IT Policies

Refer to the University’s official IT policies regarding data security and use of copyrighted material.

See All IT Policies

Training and User Guides

Complete security training and get user guides for helpful security tips and advice.

Security Training and User Guides

Phishing Alerts

Listed below are the latest phishing scams that have been acted upon by Information Security. Think you’ve received a phishing email? Don’t click it, report it.

Email Scam (June 24, 2024): $18,750.00 APPROVED.

From: Latoya Miller <latoya.miller@calhoun.edu> Date: Saturday, June 22, 2024 at 8:41 PM Subject: $18,750.00 APPROVED. You have been selected to receive a total sum of $18,750.00 allocated for 2024 CARES ACT. Allocated funding to assist relieving students and...

read more

Security News

Check here for the latest security alerts that may affect you.

5 Ways to Outsmart a Social Engineer

“Social engineering” is a newer term for an age-old pursuit: tricking people. Whether you use the modern-day terminology or opt for longer-standing classifications (like conning, hustling, and swindling), the result is the same. Scammers aren’t afraid to tell lies—...

Ransomware Attacks

Ransomware attacks are one of the most serious cybersecurity threats we face at the University of Chicago. Ransomware is a type of malicious software that steals user data, disables the user system, and then demands payment from the victim in order to re-enable system...

3 Wi-Fi Habits to Adopt Today

Studies have shown that most mobile device users — even those who are security-savvy — tend to throw caution to the wind when it comes to connecting to open-access, public Wi-Fi networks. Public networks are displayed in the list of Wi-Fi networks without a lock icon....