What’s your information security style?

How much is the right amount of information to post about yourself online? Should you share everything or only certain information? Or should you keep all of your accounts locked down and even swear off social media altogether? Truth is, it’s your choice. What’s most important is to ensure that you are making mindful choices as you engage online.

One way to think about online risk is by comparing it to your own personal level of comfort. Some people are an open book, happy to share all of the intimate details of their lives, while others prefer to be private, never divulging information about themselves. However, the vast majority of people probably identify as somewhere in the middle.

Once you have identified where you land on the information security scale, make sure that your settings match your preference. For example:

  • Privacy settings: The default privacy setting for most social media platforms is set to open. Before sharing, consider your comfort level and select your privacy setting accordingly.
  • App permissions: Before downloading any app, take a moment to consider the permission settings. Do you want the app to have access to your camera, mic or Wi-Fi connection info?
  • Location access: When using apps, consider whether they need access to your location. Often this is only a convenience and keep in mind that this information is often collected for marketing.

If you take these steps, you can rest assured knowing that your online presence accurately reflects your personality and preferences.

To learn more about managing your online presence visit www.securitymatters.utoronto.ca.

Who are our information security professionals?

The arrival of October hails the start of Cyber Security Awareness Month (CSAM). The University of Toronto’s (U of T) Information Technology Services’ (ITS) Information Security (IS) team supported by Education and Awareness is participating by hosting educational activities throughout the month, promoting the theme: ‘One team. One goal.’

During this campaign, ITS will engage the U of T tri-campus community, sharing information and answering questions related to information security.

This week’s questions

Who are the University’s information security professionals?

U of T’s information security community are teams of highly skilled individuals across the St. George, Mississauga and Scarborough campuses. They are dedicated to safeguarding the institutional and personal data of its tri-campus staff, students and faculty members.

The teams are comprised of information security architects, analysts, project managers, administrators and coordinators who specialize in risk assessment, identity and access management, privacy analysis, incident response, cloud security, authentication and more!

What do the University’s information security professionals do?

The University’s information security professionals deal with everything and anything relating to the security of U of T’s data. These dealings include:

  • Providing information security services: They provide essential services that maintain the security of University accounts. These services include multi-factor authentication (MFA), UTORauth, UTORvpn, Remote Desktop Gateway, network vulnerability scanning and much more.
  • Informing University policies and guidelines: Our information security teams provide the University as a whole with essential information security and privacy guidelines. The guidelines inform numerous aspects of the management of U of T’s digital assets, from the U of T password policy to the procedure required when a security incident is reported (including phishing emails).
  • Supplying information security tools: They also offer a comprehensive list of information security tools.

These dealings are, of course, just the tip of the iceberg: the scope of information security at U of T is as wide and varied as the community that it protects and is constantly evolving. To learn more about these developments stay tuned to this blog throughout October and visit our resource section for updates.

CSAM: Cyber security – we’re in this together!

October is just around the corner and while temperatures may be dropping, cyber security education and awareness will be on the rise.

The start of a new school year brings with it new cyber risks and threats. The University of Toronto’s (U of T) Information Security team is tackling issues of privacy and data protection by hosting its annual Cyber Security Awareness Month (CSAM) activities across all three campuses, starting Oct. 1.

Part of this year’s focus will be on how individuals and the University must work together to keep its systems and people secure. The overall theme will be: “One Team. One Goal.”

“We’re in this together – Universities are places of open inquiry, exchange of information, and collaboration,” explains Isaac Straley, U of T’s Chief Information Security Officer (CISO), Information Security. “Information security and privacy can be a challenge in this environment, but it is not a zero sum game. We do, though, have to help each other out.”

CSAM activities will include pop-up booths at all three campuses, staffed by security team members. At the booths, students, faculty and staff will have the chance to meet University employees who help protect their privacy and data as well as pick up resources about how to practise information security in the office, classroom, academic spaces and at home.

“The increasing need to develop critical cyber security skills is an important message for the entire University audience and I’m really excited to see this initiative broaden its support to the tri-campus community,” says Luke Barber, Director of Information & Instructional Technology Services for U of T Mississauga. “I think we’ll all see benefits and learning outcomes far greater than the sum of our individual efforts in doing so!”

Zoran Piljevic, Director of Information & Instructional Technology Services at U of T Scarborough, agrees. He says regardless of whether you are at work or school, the organization’s online safety and security is a responsibility that we all share. “Our data is valuable and we need to incorporate a daily routine of vigilance when handling information,” says Piljevic. “We look forward to emphasizing resistance and resilience through our education, training and awareness efforts in October at the Scarborough campus.”

Other CSAM-related events taking place throughout the month will include contests, an Information Security Council Panel discussion and social media polls. For a full list of events, visit the Security Matters calendar.

Straley, who joined U of T as its first-appointed CISO in December 2018, will also be hosting an invitation-only “Coffee with the CISO” event at each campus.

A recognized thought leader in information security and privacy, Straley held a similar CISO role at the University of California for 13 years. His top security tips to the U of T community are: “Be thoughtful about unexpected emails, especially those with urgent demands, be careful about the apps you install on your devices, and always check privacy setting and default sharing. You do not have to be an expert or work hard to make a real difference.”

Talking tech and security at the student street fest

Hundreds of University of Toronto (U of T) students and staff had the chance to talk to Information Technology Services (ITS) staff and take home swag, resources and prizes during the 2019 Students’ Union (UTSU) Street Fest, held under warm, sunny skies on Sept. 11.

Three ITS-related booths exhibited at the annual
St. George Street festival: Information Security (IS), Quercus and Next Generation Student Information Services (ACORN).

The IS and Quercus booths both enticed the crowd with games. IS hosted the “Catch the Phish” challenge, awarding University-branded power banks to winners who could spot 10 signs of a phishing email. Offering a range of prizes, including mugs, the Quercus-themed “A Tree Through The Ages” trivia challenged people on their knowledge of the U of T learning management system.

Meanwhile, ACORN staff was on hand next store to answer questions about the student information service and give out sweet treats.

Check out more of the activity on social media: Twitter and Instagram.


Coming up….
Stay tuned for more information security coming up this October. Students, staff and faculty members can participate in events and activities during Cyber Security Awareness Month (CSAM), happening across all three campuses.

Visit our Security Matters calendar to stay up-to-date on upcoming activities.

New phishing scams are targeting U of T staff and students

September is a busy month for everyone at the University as we gear up for the fall semester. At the University of Toronto (U of T), communication between administrative staff and the student community is at its peak, making it the perfect time for attackers to phish people under the guise of administrative and student interaction.

This year, attackers are leveraging the communications of a new school semester in a variety of ways. Currently, two of the most common scams at U of T feature:

  • Urgent email account upgrade notices that threaten account termination.
  • Emails containing potentially malicious attachments.

Read below for a description of these phishing scams and tips on what to do if you receive one.


1. Upgrade notice

A widely-circulated email is asking students and staff to ‘upgrade’ their U of T email accounts before termination by providing a phone number that they are asked to text. The recipient is then asked to await further instruction. Examples of this phishing email can be viewed on the Security Matters PhishBowl here: https://securitymatters.utoronto.ca/phish-university-of-toronto/.

If you have received this email, Information Security and Enterprise Architecture (ISEA) recommends you take the following actions:

  • If you responded to the email and texted the phone number, you should immediately take steps to block that number. Information on how to block numbers can be found on your device’s webpage or FAQs.
  • If you followed further instructions and provided your UTORid and password, please immediately change your password by clicking on the ‘reset’ link in the Password and Account Management section at https://www.utorid.utoronto.ca.

2. Attachment ‘request’

The second common phishing email appears to come from someone in the U of T community. For example, the attackers attempt to engage administrative staff members by pretending to be a current student. The email claims to provide ‘requested’ details through an attachment that they prompt the recipient to download. The attachment contains potentially malicious content that, when opened, could affect the user. Examples of this phishing email can be viewed on the Security Matters PhishBowl here: https://securitymatters.utoronto.ca/phish-re-mbpgsa-email-friday-night-live-the-rom/.

If you have received this email, ISEA recommend you take the following actions:

  • If you opened an attachment that you suspect may be malicious, please run your anti-virus software. If you do not have anti-virus software or you are in a position where it cannot be run, you should contact helpdesk for further assistance at: http://help.ic.utoronto.ca.

During this busy time, ISEA would like to remind the U of T community to be vigilant and to report any communications that seem unexpected or odd. Please follow the guidelines outlined here: https://securitymatters.utoronto.ca/report/.

Recipients of phishing emails are also asked to report these messages using the “Report Message” function in Outlook, which can help reduce the number of times these emails are delivered. To report an email, follow these steps:

Select the email.

  1. For Outlook on desktop, look to the top right of the menu bar for a ‘Report Message’ icon. If you are using the online version of Outlook, look for the three dots to the right of the forward email symbol.
  2. Click on the arrow or dots and select the ‘Phishing’ option.
  3. In the popup window, confirm you would like to report. After confirming, the email will be reported and removed from your inbox.

For more tips on how to spot phishing emails and stay safe online, visit the Security Matters resource section.

[Phish] Re: MBPGSA Email – Friday Night Live @ the ROM!

Details:

From: [University of Toronto student]

To: [University of Toronto staff member]

Subject: Re: MBPGSA Email – Friday Night Live @ the ROM!

Text:

Hi there,

I hope everything is great

Here’s details you have demanded most recently. Please don’t hesitate to get the needed files as an attachment.

Feel free to make contact with me me in case you could have any inquiries.

Respectfully Yours,

[Readacted] [Readacted].doc (161.3 KB)

[Phish] University of Toronto

Details:

From: [Redacted] To: [University of Toronto student]

Subject: University of Toronto

Text:

Dear User,

This is to inform you that our web-mail server has been scheduled for upgrade and maintenance.

To avoid your e-mail account been terminated during this upgrade Send “UTORONTO UPGRADE” to (xxx) xxx-0945

You will receive instructions via text on how to upgrade your account.

Your Email access will be disable if you fail to comply with the above. We do apologize for any inconvenience caused.

Regards
System Administrator
University of Toronto

Capital One breach: lessons universities can learn

In late July, a data breach at Capital One Financial compromised the personal data of more than 106 million people, including six million Canadians. This breach is just another example of a very long list of multi-national companies who have been targeted by attackers in recent years, including Equifax in 2017, Marriott in 2018, Facebook in 2019 and the Australian National University in 2019.

How did this breach happen? Capital One runs its credit card services through Amazon Web Services (AWS) and current reports show the cause of the breach was an incorrect firewall configuration. The alleged attacker, Paige Thomson, 33, was able to break through the misconfigured firewall to reach the cloud-based AWS server where Capital One was storing its customer data. AWS had no responsibility in causing or detecting the breach — Capital One was responsible for its firewall configuration and the vulnerability that allowed the attacker unauthorized access.

This incident can serve as a lesson for the University of Toronto (U of T) community as it starts to make use of more third–party computing infrastructure and platform services:

  • Use of third–party cloud storage services does not completely absolve the University from taking responsibility for IT-centric tasks, such as firewall configuration and monitoring or best practice network architecture usage.
  • The University needs to be aware of the way third–party vendors describe the division of responsibility. For example, AWS, Microsoft Azure and other third–party infrastructure and platform providers make it clear in company guidelines, outlining the division of responsibility between the company and its customers.

U of T must also remain wary of how different types of services denote different levels of responsibility for customers:

  • The Infrastructure-as-a-Service (IaaS) offering puts the responsibility for all software patching, upgrading, network configuration and isolation, incident detection and response and data protection on the customer.
  • Platform-as-a-Service (PaaS) puts the responsibility for application patching, network configuration and isolation, incident detection and response and data protection on the customer. Also, PaaS support is less work than IaaS for the customer.
  • Software-as-a-Service (SaaS) often places the responsibility for authentication and authorization to access data on the customer.

For more information and tips on protecting your data, be sure to visit our resources section.

Have you received a possible phishing email? Updated resources are now available

The University of Toronto’s Information Security and Enterprise Architecture (ISEA) team is dedicated to keeping information secure for staff, students and faculty alike. The Security Matters website now features an updated Report an Incident section for members of the University community who suspect they have received a phishing email. 

The update provides practical steps to take if you are the recipient of a suspicious email from a known or unknown email contact: the email might ask you to click a link, download an attachment, enter your credentials or send money or gift cards 

If you suspect a phishing attempt, please follow the updated guidelines at https://securitymatters.utoronto.ca/report/ and email report.phishing@utoronto.ca. 

July 26, 2019 – special advisory on phishing messages

Recently, the University of Toronto (U of T) has seen an increase in targeted phishing attempts and attacks. These phishing attempts and attacks are becoming more sophisticated and polished. Some of these emails are crated to look like urgent appeals for action from the signature of U of T leadership, including from high-level University executives, leaders and managers within academic and administrative departments. This includes fraudulent emails that appear to be sent from President Meric Gertler. U of T leaders’ signatures are being copied (from legitimate emails), their sign-off phrases and writing styles are also being mirrored and used by cyber criminals.

Recent targeting phishing attempts/attacks include:

  • Urgent emails with memos attached from leadership
  • Warnings that appear to come from leaders/managers that your email, library or other U of T account is about to expire
  • Requests for immediate help (“Are you available?”), followed up by discussion (“Can you go get me some gift cards?”)
  • Requests for changes to financial arrangements, especially banking or payment to creditor

Look out for incorrect email addresses and a sense of urgency

An example of email headers with incorrect addresses and a subject line with a sense of urgency

From: Jane Doe <janedoe@NOTutoronto.ca>
Sent: July 12, 2019 12:50 PM
Subject: [ACTION REQUIRED] Faculty/Staff Revised and Updated Catalog From PRESIDENT MERIC GERTLER

From: Meric Gertler Sent: February 3, 2019 at 11:24:47 PM EST
Subject: Urgent Request!

Note:

  • The email addresses are not correct.
  • The subject lines indicate urgency.

What can you do if you suspect a phishing attempt/attack?

  • If you suspect your password may have been compromised, immediately change it
  • Please report phishing messages to report.phishing@utoronto.ca
  • When in doubt, call or ask the sender in person to confirm the email was really from them
  • If you opened an attachment that was provided in a phishing email, reach out to your local IT service desk immediately

Thank you for your support as we work together to keep all of us and our information safe and secure online.

Sincerely,
Isaac Straley
Chief Information Security Officer (CISO)