Skip to main content
Learn More
Shearman at dusk

Information Security

Information Security

Information

If you have IT security questions or need help, please contact the Helpdesk or InfoSec.
McNeese will NEVER ask for account information via email. Messages about quotas, upgrades or maintenance are likely Phishing attempts.

The protection of information resources at McNeese State University is a high priority. The Information Security website is designed to educate the university community about technology policies and information security best practices, and equip students, faculty and staff with the tools needed to protect the information resources of the University, it's members and connected networks.


Please read the Policies, Guidelines, and Laws Relating to Information Security.

Phishing Attempts Continue To Plague Universities

Ignore and Delete Suspicious Email

05/23/2014
McNeese State University is often the subject of phishing attempts in which an email claims to be from a group or person at MSU or claims to be specifically related to University business. Some of the recent attempts claim that your email has exceeded its quota or that you need to verify your account due to a service upgrade. Various other models are seen from time to time, as well. These are fraudulent and should be deleted.

If you received the below email or similar, please ignore and delete it. This is a phishing attempt.

From: "Technical Support"
Reply To: xxxxxxxx@xxxxxxx.xxx

You are required to click on the link to verify your email account because we are upgrading our webmail.

Webmail Technical Support Copyright 2012. All Rights Reserved


Disclaimer:

Google Chrome Could Allow Remote Code Execution

MS-ISAC ADVISORY NUMBER:  2014-048

Executive Summary

05/21/2014
Multiple vulnerabilities have been discovered in Google Chrome that could result in remote code execution. Google Chrome is a web browser used to access the Internet. These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. Depending on the privileges associated with the application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Threat Intelligence

At this time, there is no known proof-of-concept code available.

Systems Affected

  • Google Chrome versions prior to 35.0.1916.114

Risk

Government
  • Large and medium government entities: High
  • Small government entities:

Password Day 2014

World Password Day 2014 | 05.07


Password Day 2014
From https://passwordday.org:

If you're like most people, you've used the same password for years.

Cyber criminals regularly steal passwords by the thousands from the companies and databases that store them. This can put you in hot water if you haven't changed your passwords recently, or use the same password across web sites.

Upgrading your password takes five minutes and can save you hours of trouble dow

Pages