Section content mobile menu toggleSection Content

Information Security at the University of Hawai‘i

CampFIRE Cyber Security Challenge

Join UH for a jeopardy-style Capture the Flag featuring real-life cyber attacks infographic

Join your fellow cyber security professionals and aspiring professionals (college students) for CampFIRE: a Capture The Flag (CTF) that will challenge your Forensics, Incident response, and Reverse Engineering skills. Challenges are based on real-life attacks at UH and day-to-day operational cyber security tasks. CampFIRE will be held at the University of Hawaii Information Technology Center on the UH Manoa campus. Participation is capped at 60 people, so register today at https://www.hawaii.edu/infosec/campfire/

CampFIRE participants are also invited to be mentors to assist and guide high school students for their CampFIRE event on Wednesday, January 3, 2018 at Honolulu Community College. If you have any questions, please send them to: tech-conf@lists.hawaii.edu



Your Mobile Devices Won't Secure Themselves!

Mobile security at one time meant using a laptop lock and keeping tabs on your phone. However, the growing capabilities and use of mobile devices - coupled with the ubiquity of smart devices stitched into the very fabric of our daily lives (figuratively and literally) - now require a more sophisticated defense-in-depth approach to match the growing threat. Following are a few things you can do to protect your devices and personal information on campus, at home, or at work.

  • Secure your devices with a strong password, pattern, or biometric authentication. Check the settings for each device to enable a screen-lock option. For home routers, reset the default password with a strong one.
  • Install anti-malware. Some software includes features that let you do automatic backups and track your device.
  • Check your Bluetooth and GPS access. Disable these settings on all devices when not needed and avoid using them in public areas.
  • Update your devices often. Install operating system and application updates when they become available.
  • Review phone apps regularly. Remove any apps you don't use. Be selective when buying or installing new apps. Install only those from trusted sources and avoid any that ask for unnecessary access to your personal information.
  • Treat devices like cash! Don't let your devices out of your sight or grasp. Maintain physical control of your device in public areas. Get a lock (alarmed is best) for your laptop and use it.
  • Keep it sunny in the cloud. Whether using Google Drive, Dropbox, OneDrive, iCloud, Amazon Drive, or any of the many cloud options, set privacy restrictions on your files to share them only with those you intend. Protect access to your cloud drive with two-factor authentication.
  • Create a secure wireless network. Configure your wireless router to protect your bandwidth, indentifiable information, and personal computer. Secure it with proper set up and placement, router configuration, and a unique password, using the strongest encryption option.
  • Protect your Internet of Things (IoT) devices. Are you sharing your livestreaming nanny cam with the world? Review privacy settings for all Internet-ready devices before connecting them to the web.

Source: STOP. THINK. CONNECT. Wi-Fi poster

US-CERT Vulnerability Alerts

The United States Computer Emergency Readiness Team (US-CERT) provides the latest updates about current threats and vulnerabilities. You can subscribe to their feed to get the latest updates about ongoing vulnerabilities and other cyber threats.

Visit https://www.us-cert.gov/ to learn more.


Don't Fall for Phishing:
Stop. Examine. Ask. Report.
S.E.A.R. the Phish

SEAR the Phish Logo
SEAR the Phish

Stay Informed! Follow us and like us:

Twitter Logo Twitter     Facebook Logo  Facebook