|Title||Start Date & Time||End Date & Time|
|Service Maintenance Scheduled: MSSC & Transportation Network||Thursday, July 27, 2017 - 6:00am||Thursday, July 27, 2017 - 7:30am|
|Service Maintenance Scheduled: MyCUHub||Saturday, July 29, 2017 - 8:00am||Saturday, July 29, 2017 - 10:00am|
|Service Maintenance Scheduled: Web Express||Saturday, July 29, 2017 - 8:00am||Saturday, July 29, 2017 - 10:00am|
|Service Maintenance Scheduled: Campus Solutions & Portals||Saturday, July 29, 2017 - 6:00pm||Sunday, July 30, 2017 - 6:00pm|
|Service Maintenance Scheduled: Enterprise Directory (LDAP), directory.colorado.edu||Tuesday, August 1, 2017 - 6:00pm||Tuesday, August 1, 2017 - 7:00pm|
|Service Maintenance Scheduled: Human Capital Management (HCM)||Thursday, August 3, 2017 - 6:00pm||Thursday, August 3, 2017 - 11:59pm|
|Service Maintenance Scheduled: Campus Firewall||Wednesday, August 16, 2017 - 5:30am||Wednesday, August 16, 2017 - 6:30am|
Adobe has released Security Updates for Adobe Acrobat and Reader. The updates address vulnerabilities that could cause the applications to crash and potentially allow an attacker to take control of the affected system.
The updates are intended to address the issues contained in the Adobe Acrobat and Reader Security Advisory released February 13, 2013.
The IT Security Office advises that owners of the software listed below update to the latest version of their installed software.
Security bulletin names:
APSB13-07 Security updates available for Adobe Reader and Acrobat
Release date: February 20, 2013
Additional information about this vulnerability can be viewed at:
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or firstname.lastname@example.org. Email and phone help is available Mondays through Thursdays, 7:00 a.m. to 10:00 p.m.; Fridays 7:00 a.m. to 7:00 p.m.; and Saturdays and Sundays, noon to 6:00 p.m.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.