|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Red Hat Satellite (redhat.colorado.edu)||Thursday, November 3, 2016 - 12:40pm|
|Service Maintenance Scheduled: My Leave, Finance Resources (FIN), and Human Capital Management (HCM)||Saturday, December 10, 2016 - 6:00am||Saturday, December 10, 2016 - 6:00pm|
|Service Maintenance Scheduled: ServiceNow (ticketing system)||Thursday, December 15, 2016 - 7:00pm||Thursday, December 15, 2016 - 9:00pm|
Sending and receiving email, file sharing and browsing websites may seem innocuous on the surface, but if you’re not careful these activities can open your computer to countless vulnerabilities. Email messages can easily be forged and they’re often used to launch malware. Malicious web sites can install software on your computer or collect personal information from your computer.
Here are a few basic things to keep in mind:
Access to OIT systems requires the use of secure clients and encrypted authentication. Not only does it help protect our network from malicious computer attacks and stolen logins, passwords, etc., but also new federal grant rules require secure computer practices.
The operating system on every desktop must be kept up-to-date. OIT has documentation on configuring your Windows system for automatic updates. OIT also has documentation for running Windows Update manually.