|Title||Start Date & Time||End Date & Time|
|Service Issue Reported: Power outage on East Campus||Tuesday, February 13, 2018 - 1:40pm|
|Service Issue Reported: Microsoft Store and Store Apps - General Access Issue Reported||Thursday, February 22, 2018 - 3:44pm|
|Service Issue Reported: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Student Account Access||Friday, February 9, 2018 - 12:39pm|
|Service Maintenance Completed: Digication||Sunday, February 25, 2018 - 4:00am||Sunday, February 25, 2018 - 6:00am|
|Service Maintenance Scheduled: IEC & MTRS Building Networks||Thursday, March 1, 2018 - 6:00am||Thursday, March 1, 2018 - 7:00am|
|Service Maintenance Scheduled: Campus Firewall||Tuesday, March 6, 2018 - 5:30am||Tuesday, March 6, 2018 - 6:30am|
Apple has released a Flashback Removal Tool as an update to OS X Lion (10.7) and updates for Java on Mac OS X 10.6 that include a Flashback Removal Tool. These updates address vulnerabilities that could allow malicious users to execute arbitrary code, steal highly confidential data and take control of affected computers.
The IT Security Office advises applying the updates as soon as possible. These updates may require a restart; please plan accordingly.
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or email@example.com. Phone help is available Monday through Friday from 8 a.m. to 7 p.m.
This Java update disables the Java applet plug-in by default in Java Preferences. As you may know, the campus’s Network Connect VPN requires that the Java applet plug-in be enabled in order to connect. Learn more about this issue and how to enable the Java applet plug-in.
Security Bulletin Names:
HT5247: Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8
Released: April 12, 2012
HT5254: Flashback malware removal tool
Released: April 14, 2012
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.