|Title||Start Date & Time||End Date & Time|
|Service Maintenance Completed: Virtualized desktop and BYOD deployments||Monday, November 23, 2015 - 9:00am||Friday, November 27, 2015 - 5:00pm|
|Service Maintenance Scheduled: RedHat Enterprise Linux systems||Wednesday, December 2, 2015 - 7:00am||Wednesday, December 2, 2015 - 7:30am|
|Service Maintenance Scheduled: HR Resources||Friday, November 20, 2015 - 5:00pm||Thursday, December 3, 2015 - 9:00am|
Sending and receiving email, file sharing and browsing websites may seem innocuous on the surface, but if you’re not careful these activities can open your computer to countless vulnerabilities. Email messages can easily be forged and they’re often used to launch malware. Malicious web sites can install software on your computer or collect personal information from your computer.
Here are a few basic things to keep in mind:
Access to OIT systems requires the use of secure clients and encrypted authentication. Not only does it help protect our network from malicious computer attacks and stolen logins, passwords, etc., but also new federal grant rules require secure computer practices.
The operating system on every desktop must be kept up-to-date. OIT has documentation on configuring your Windows system for automatic updates. OIT also has documentation for running Windows Update manually.