Alerts Contact ITServices at 36666 Fri, 19 Dec 2014 13:36:06 -0500 Zend_Feed_Writer 1.10.8 ( G.E. Picture Perfect - experiencing issues *Update*
The GE Picture Perfect system is now operating as expected. Normal function is restored. Updates to door schedules and fob/badge access should now be up to date. Please contact the the IT Support Centre if you have any issues.

Previous Description (2014-12-18 10:38:49):

IT Services is currently investigating: There are currently communications issues being experienced by the GE Picture Perfect system. Systems is investigating the problem.

Service Name: Picture Perfect, PSIG

Description of Problem: The door access system controlling many of the buildings on campus is currently experiencing a connectivity issue. Updates to key fobs/badges and schedule changes to doors are not taking affect. The vendor repair technicians have been dispatched.

Users Affected: Building operators using the Picture Perfect system.

Thu, 18 Dec 2014 17:54:41 -0500 0
Network maintenance Mclaughlin Hall ]]> Tue, 16 Dec 2014 20:43:51 -0500 0 Network issues in McLaughlin Hall *Update*
Network Connectivity has been restored

Previous Description (2014-12-16 14:59:43):

ITServices is investigation the loss of network services to McLaughlin Hall.]]>
Tue, 16 Dec 2014 15:28:18 -0500 0
Network Issues On Campus *Update*
Network issues have been resolved.


Previous Description (2014-12-13 09:42:08):

There are network issues in the following locations. Networks team is aware and working on resolution.

The locations are:

- 80,82 Barrie
- Louise D'acton
- Medical education Bldg
- Botterell

Sat, 13 Dec 2014 10:07:58 -0500 0
Network Outage in Botterell Hall Sat, 13 Dec 2014 06:41:55 -0500 0 Important Security Advisory about Ransomware
Ransomware is malicious software that can encrypt files on an infected computer or device. It then alerts the user that a ransom must be paid in order to recover the data. The consequences of these attacks can be serious - besides loss of data and financial loss, there are significant costs to productivity, including the resources required to recover a compromised system.

How to prevent and mitigate ransomware attacks:

- Attacks are often perpetrated through emails that appear to be legitimate, but contain attachments or links to vulnerable websites. The best way to prevent an attack is to avoid opening unsolicited attachments or clicking links without inspecting them first. Learn more:

- Back up your important files to a secure location regularly. If your system becomes infected, locally stored data can be lost permanently, in the blink of an eye. When your data is backed up, your hard drive can be wiped and your data will remain safe.

- ITS recommends keeping work-related files on Windows File Service. This ensures that your data is stored on a file system that is redundant and backed up on a daily basis. To date, no local data has ever been recovered on a Queen's PC infected by ransomware, however ITS has been successful in retrieving ransomware-infected files stored on Windows File Service. Learn more:

Alternately, you can use QShare, and Microsoft's OneDrive for Business will be made available to Queen's faculty, staff and students in the coming weeks.

- Install antivirus software and keep it up to date. Microsoft System Center Endpoint Protection (SCEP) is available to faculty and staff, and can be downloaded from MyQueen'sU. Learn more:

- Learn about safe computing practices – an Information Security Awareness course is available on Moodle:

- It is important to note that full drive encryption will not provide protection against the effects of being infected by ransomware.

What to do if your system becomes compromised:

- Stay calm. Do not reply to the attacker or pay the ransom. You will be putting yourself at further risk by disclosing your financial details, and you still might not get your data back.

- Report the incident to the IT Support Centre immediately. You can also get help with identifying suspicious messages. Call 613-533-6666 or fill out the online help form:

More information:

- Examples of ransomware include Cryptowall, Cryptolocker and CoinVault. You can find more examples documented on Microsoft's website, along with a list of ransomware FAQs:
Wed, 19 Nov 2014 16:29:01 -0500 0