Add yourself to our Newsletter list to receive future installments.
... Or if this is your first time here, Welcome! Bienvenidos! Ahlaan Bik! Svaagat He! Huanying!
This edition marks our second quarterly newsletter and you can check out the inaugural edition here.In our newsletters we’ll share a little bit about the projects we are working on, the services we provide, and things we think you’ll be interested in.
Now on to what was happening between April and June, 2021...
UC Accellion Data Breach
Spring whizzed by as we were learning more about the UC Accellion Data Breach. There was a tremendous amount of information covered in our Identity Theft Resources and Identity Theft Protection Town Hall, so be sure to check them out. And we also created a page of Resources for Prevention and Response to Online Harassment - please share with others who may find the content helpful.
CalNet Directory Update
Our CalNet developers have been hard at work updating the CalNet Directory Update tool (that’s the spot you go to update your info). It’s not only getting a facelift, we will be adding additional features like pronouns and you will be able to request new values for honorifics and generational titles. Sweet, when will it launch? We are shooting for fall, so stay tuned for more info.
CalNet Passphrase Reset Project
I know, it’s confusing. Directory Update, Passphrase Resets, CalNet. How will you ever keep them straight? Well, good news my friend! We have completed the CalNet Passphrase Reset Project for all non-grace accounts, so basically you don’t have to worry about that one anymore. Thanks for changing your passphrase and helping us to better secure our community.
Send Me a Push
Or rather, send yourself a Push. We highly recommend using the Duo Mobile App to "Send Me a Push” when you do your CalNet 2-Step. Okay, but why should I do the Push? Well, I'm glad you asked... (clears throat and queues bulleted list):
It's quicker than a text or a phone call and it's more secure.
Duo Push encrypts the message to/from your phone.
The App screen tells you information, like the location where the prompt originated from - so if you ever get a random request from say, Maui, when you are in Berkeley, you’ll know something’s up!
It protects better against man-in-the-middle attacks. Man-in-the-what-now? MiTM attacks are when the bad guys intercept the SMS passcode sent to you and then use it to log in as you.
....And it uses almost no data. 500 pushes to your device will use 1 MB of data in total. That’s like loading our security.berkeley.edu homepage on your smartphone. Which you do all the time, right?
If you stopped using the Duo App because it was acting buggy, reinstall it! Many of the issues have been worked out and we have great instructions for setting up your smartphone or a tablet device to make it easy.