199 posts categorized in

IS&T

  

Cybersecurity Through the Eyes of the Turtle and the Hare Part 3: The Consequences

April 15, 2025 by Keith Barros | IS&T

Recap of Part 2: Shelby received a suspicious email and reported it to the InfoSec team, who confirmed it was a phishing attempt. Bugsy, on the other hand, received a phishing email and fell for it, compromising his account and computer. That night, while Bugsy slept, alerts were going off in the university’s Security Operations

Discover the Latest IT Projects Episode Three - Lauri Mantooth

April 11, 2025 by | IS&T

Welcome to the third episode of IT Insights, our new video series featuring exclusive interviews with experts in Information Systems and Technology (IS&T). This series is designed to create a welcoming space where we can discuss the latest projects, share valuable insights, and highlight the incredible work happening in the world of IS&T at Chapman

Cybersecurity Through the Eyes of the Turtle and the Hare. A 3-Part Story Part 1: The Tale of Two Employees

March 31, 2025 by Keith Barros | IS&T

As the Chief Information Security Officer (CISO) for Chapman University, I’d like to share a compelling tale of two employees with contrasting approaches to their work and cybersecurity practices. In the ever-evolving cybersecurity landscape, the story of the turtle and the hare takes on a new meaning. This story highlights the importance of diligence and

Enhancing Security with SSO Integration for Zoom

March 12, 2025 by | IS&T

We’re excited to announce an important update that will improve how we access Zoom. To strengthen Chapman University’s security and streamline your login experience, starting 5/28/25, we will require Single Sign-On (SSO) for all Zoom accounts at Chapman University. Why SSO? Security and convenience are crucial in today’s digital workplace. Requiring  SSO with Zoom offers several

Cybersecurity Awareness: Daylight Savings and Spring Break

February 28, 2025 by Keith Barros | IS&T

As the CISO for Chapman University, I want to highlight the importance of cybersecurity during March. With daylight savings time and spring break upon us, these events bring a change of pace and new opportunities. Still, they also present unique cybersecurity challenges we must be vigilant about. Here’s why maintaining strong cybersecurity practices is crucial

Annual Password Reset Reminders Are Coming Soon

February 10, 2025 by | IS&T

As part of our ongoing commitment to maintaining the security of our systems, the Information Sytems and Technology team (IS&T) will soon send email reminders for the annual password reset to Chapman University’s faculty and staff. Please keep an eye on your inbox for these notifications, which will provide you with all the necessary details

The Importance of Reporting Suspicious Cyber Activities and Emails

January 31, 2025 by Keith Barros | IS&T

As we navigate the digital landscape, the security of our information and systems at Chapman University remains a top priority. One of the most effective ways to protect our community from cyber threats is through vigilance and proactive reporting of suspicious activities and emails. As the Chief Information Security Officer (CISO) for Chapman, I want

Discover the Latest IT Projects Episode Two – Dr. Jana Remy

January 21, 2025 by | IS&T

We are thrilled to share the second episode of IT Insights, our new video series featuring exclusive interviews with experts in Information Systems and Technology (IS&T). This series is designed to create a welcoming space where we can discuss the latest projects, share valuable insights, and highlight the incredible work happening in the world of

Understanding AiTM Phishing Attacks A Guide for Regular Users

January 6, 2025 by | IS&T

What is AiTM Phishing? Adversary-in-the-Middle (AiTM) phishing is a sophisticated type of cyberattack where attackers intercept the communication between a user and a legitimate website. This allows them to steal sensitive information like passwords and session cookies, even if the user has enabled multifactor authentication (MFA). How Does It Work? In an AiTM attack, the attacker sets

Log In
Open Main Menu