Archive for September, 2017

Major Change for Banner General Forms

0 Commentsby   |  09.22.17  |  Banner

Please note these important details regarding changes we are making to some of the old Banner 8 functionality in Administrative Banner:

  • What is changing? We are disabling access to most General forms in Banner 8.  Banner General includes forms with the letter G in the first place of the seven-letter acronym (e.g., GOAMTCH).  This change does not include some custom forms that begin with the letters GZ.  Users who try to access a General form in Banner 8 will see an error.  You must use Banner 9 to access these forms.
  • When will the changes take place? The changes will be in place by the time you arrive to work on Thursday, September 28th.
  • How do I access Banner 9? Please contact the Helpdesk.
  • Where can I find more information about Banner 9? We have answered the most common Banner 9 questions in a frequently asked questions page that is accessible through the “Banner 9 FAQs” quicklink in myACU.
  • What should I do if I experience a problem? Please contact the Helpdesk at helpdesk@acu.edu or (325) 674-4357.

 

August 2017

0 Commentsby   |  09.04.17  |  Banner, Business Intelligence, Security

August 2017 by the Numbers

  • 247 end-user support requests resolved (new record for month of August and most for single month)
  • 104 development and administration issues resolved (new record for month of August)
  • 13 projects-in-progress
  • project completed
  • 9 projects requested
  • 99.91% average uptime

Reach Out

Please remember to reach out to the Helpdesk with all of your technical inquiries and problems. The Helpdesk can be contacted by phone at 674-HELP (x4357), or at helpdesk@acu.edu. We have added a call-back feature, so you do not have to wait in the phone queue. For technology problems that are disruptive during a class, please call 674-NEED (x6333) for immediate help.

Computer Security Change

At the recommendation of the Board of Trustees, IT worked with a security company to conduct a security and risk assessment. One of the resulting recommendations was that we implement a setting to lock computers after 30 minutes of inactivity to increase safeguards around unattended workstations. This change is implemented for faculty and staff PCs and is in the process of being rolled out for Macs.

Did You Know?

We use tools to monitor availability and performance of critical applications, such as single sign-on and myACU.  Our system status report is available under the Technology tab in myACU or can be accessed directly.

Discoverer Transition

The Business Intelligence office has converted 116 reports, but many still need to be reviewed for accuracy and approved by users.  This Discoverer Transition post outlines the expectations and responsibilities for Discoverer users.  Please contact Will Wyatt, will.wyatt@acu.edu, if you have any questions.

Optimizing and Enhancing Operations

We help the university to optimize and enhance operations by adopting new applications, automating manual work, and creating integration between Banner and third-party applications.  This fall we will complete multiple projects in this realm, including automation of manual processes to change records for students who cancel enrollment and enhanced data integration between Salesforce and Banner.

Avoiding Ransomware Attacks

Phishing attacks — which often contain ransomware — pose a major risk to everyone, leaving people vulnerable to information and privacy losses, identity theft, and extortion.  Learn more about the warning signs of phishing and ransomware, the potential risks of falling prey to an attack, and how you can protect yourself.

Banner 9 Project Updates

Here are the highlights of a busy month of August as well as upcoming work:

  • In preparation for the start of the Fall 2017 term, we installed updates to Accounts Receivable, General and Student.
  • We trained over 100 users in the basics of Banner 9 and have two more sessions scheduled in September.
  • The first Financial Aid 9 update is ready for testing with a go-live to-be-determined.
  • We are preparing updates to existing Banner 9 components during September and October.
  • We are ramping up work to migrate Banner forms customizations to Banner 9.  We will reduce our custom form count by almost 75%.

Avoiding Ransomware Attacks

0 Commentsby   |  09.01.17  |  Security

Ransomware is a type of malware designed to encrypt users’ files or lock their operating systems so attackers can demand a ransom payment. According to a 2016 Symantec report, the average ransom demand is almost $700 and “consumers are the most likely victims of ransomware, accounting for 57 percent of all infections between January 2015 and April 2016.”

Similar to a phishing attack, ransomware executes when a user is lured to click on an infected link or email attachment or to download a file or software drive while visiting a rogue website. Sophisticated social engineering techniques are used to entice users to take the desired action; examples include

  • an embedded malicious link in an email offers a cheap airfare ticket (see figure 1);
  • an e-mail that appears to be from Google Chrome or Facebook invites recipients to click on an image to update their web browser (see figure 2); or
  • a well-crafted website mimics a legitimate website and prompts users to download a file or install an update that locks their PC or laptop.
Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 2. A fake Google Chrome e-mail
Figure 2. A fake Google Chrome e-mail

To avoid becoming a victim of ransomware, users can follow these tips:

  • Delete any suspicious e-mail. Messages from unverified sources or from known sources that offer deals that sound too good to be true are most likely malicious (see figure 3). If in doubt, contact the alleged source by phone or by using a known, public e-mail address to verify the message’s authenticity.
  • Avoid clicking on unverified email links or attachments. Suspicious links might carry ransomware (such as the CryptoLocker Trojan).
  • Use e-mail filtering options whenever possible. Email or spam filtering can stop a malicious message from reaching your inbox.
  • Install and maintain up-to-date antivirus software. Keeping your operating system updated with the latest virus definitions will ensure that your security software can detect the latest malware variations.
  • Update all devices, software, and plug-ins on a regular basis. Check for operating system, software, and plug-in updates often — or, if possible, set up automatic updates — to minimize the likelihood of someone holding your computer or files for ransom.
  • Back up your files. Back up the files on your computer, laptop, or mobile devices frequently so you don’t have to pay the ransom to access locked files.
Figure 3. An example ransomware e-mail message
Figure 3. An example ransomware e-mail message
(This content was provided by Educause.)