Did You Know? Scammers are Impersonating University Officials
January 24, 2025
Phishing emails and other electronic scams are becoming more frequent; in recent weeks, the Security team has received multiple reports of fraudulent document-sharing attempts. In this attack, a document will be shared with UA users, supposedly requesting action by a supervisor or trusted member of the UA community.
Don't Get Hooked: Protect Yourself from Credential Harvesting Scams
January 10, 2025
Credential harvesting is an attack that tricks a user into entering their credentials into a fraudulent form, which is often designed to imitate a trusted login page. The form link is often delivered via email or text, but could also be delivered via a malicious QR code.
Helpdesk services are now provided by UAF's Nanook Technology Services (NTS)
What we do
-
Platforms and Applications
- Database Administration
- Server Administration & Hosting
- AppManager Monitoring and Administration
- Confluence WIki Pages
- Blackboard Collaborate
- Google Workspace @ UA
- Learning Management (UA Blackboard + Canvas for UAF)
- Active Directory
- Version Control (github)
- Virtual Desktop Infrastructure (VDI)
- Project Management (Team Dynamix)
-
Enterprise Applications
-
Web Services
-
Security Operations and Incident Response
Identity and Access Management
-
IT Risk Management
- Firewall Services
- Vulnerability Management (Tenable)
Governance and Strategic Planning
-
Data Privacy and Compliance
Records and Information Management (OnBase)
OIT Strategic Plan
Our Mission:
Enable learning and innovation through technology for the University of Alaska community.
Our Vision:
To become the leading public sector IT service organization in the Arctic region, enabling world-class education, innovation, and research for the University of Alaska and its partners.
Our Initiatives:
These documents are restricted to the UA Community:
- OIT Strategic Plan rev. 1.5 (comprehensive)
- Strategy Map rev. 1.9
OIT Strategic Plan Roadmap
-
Student Experience
- Banner General v9 upgrade
- UA Scholars Application Project
-
UA Cybersecurity Posture
- Security policy review
-
OIT Operational Maturity & Core Services Resiliency
- Functional unit budget alignment
- Formal OIT onboarding rollout
-
Emerging Technologies, Opportunities, and Risks
-
Student Experience
- Increase rate of completion of family housing connectivity concerns
- Redesign Tuition setup and related Banner processes (On Hold)
-
UA Cybersecurity Posture
-
OIT Operational Maturity & Core Services Resiliency
- Streamline onboarding / offboarding /transfer procedures for employees
- CAB review
-
Emerging Technologies, Opportunities, and Risks
- Evaluate current communications state
- GenAI data privacy policy and guidance
- Refine software procurement security review procedure
-
Student Experience
- Develop Data Warehouse solution
- Banner Self Service v9 Phase 2 Upgrade
-
UA Cybersecurity Posture
- Develop policy update plan and implement top 3 most critical policies
- Device and patch management programs
- Clarify roles & responsibilities around compliance requirements and resource plan
- Develop risk assessment procedures
-
OIT Operational Maturity & Core Services Resiliency
- Service alignment
- Develop enterprise architecture analysis (current state)
- CAB communications process improvement
- Succession planning, bench depth, and professional development
-
Emerging Technologies, Opportunities, and Risks
- BoR Policy and UA regulation review
- BC/DR gap analysis
-
Student Experience
- Advocate for significant broadband capacity improvements as a community anchor institution
- Modernize UA Foundation Scholarship processing
- Right-sizing in-flight community campus bandwidth
-
UA Cybersecurity Posture
- Adopt enterprise-wide program for remediating existing and future vulnerabilities
- Implement annual security awareness training for all employees
- Develop and implement system-wide incident response procedures
- Implement MFA for active identities
- Develop and implement UA cyber metric reporting and communication plan
- Develop and implement executive security reporting approach
-
OIT Operational Maturity & Core Services Resiliency
- Google Workspace Storage
- Develop Application Lifecycle Management plan
- Develop Directory Services modernization plan
- OIT reporting (portfolio/ program management)
- Identity & Access Management plan
- CMT Recharter
- Service-Budget alignment
- Develop leadership development program
-
Emerging Technologies, Opportunities, and Risks
- Conduct communications market analysis
- Review modernized connectivity options
- Develop contract and vendor management approach
- Prioritize implementation of modernized network delivery