In our newsletters, we share a little bit about the projects we are working on, the services we provide, and things we think you’ll be interested in. Add yourself to our Newsletter list to receive future installments.
Now Hiring!
Are you looking to grow in your career? Do you like solving puzzles and having variety in your day? Want to work with an amazing team of colleagues (cough, if I do say so myself)? Well, look no further! We are hiring for several positions:
General Updates
New CalNet 2-Step Look for Browsers
On Apr. 5 you will see some new screens when completing the Calnet 2-Step on a browser. You don’t need to do anything to get the new browser experience. However, I recommend watching this short one-minute video so you know what’s changing, and also because I want to see how many people I can get to watch it - validate my work, folks! ;)
Oh and our amazing Systems Admin, Jonathon Taylor, created this testing site, so you can see what your experience will be like! Try it out by first opening a private or incognito window in a browser and go to: https://2step-test.calnet.berkeley.edu/
In March, we launched Socreg
You did, what now? Socreg (pronounced “Sock” and the first part of registration) is the new and improved user interface for our asset registration portal.So, do I register my socks there? Ha, no, it’s where you register computers or devices that are connected to the campus network. “Soc” actually stands for Security Operations Center and it’s what we use to monitor campus assets and if we find anything weird, we reach out to the Security Contact for the device or system. That sounds confusing… Do you have more resources to help me? Indeed we do! We created new Socreg documentation and every page inside of the Socreg application has “Help” in the top bar. Oh, and we wrote this handy guide: You’re a Security Contact, Now What?
Zoombombing attacks increasing on campus
As someone who has recently been Zoombombed, it’s no fun. If there is one thing you can remember in the moment it’s to stop Zoom by going to "Security" then select "Suspend Participant Activities” in the menu - that way you can boot those unwelcome parties and get back to business.
What can you do to avoid Zoombombing?
Do not publish Zoom join links online. Follow the recommendedsettings for securing Zoom, especially the following:
- Allow only signed-in users to join, and require an @berkeley account, if possible.
- When using a waiting room, leave it on for the entire meeting and have at least one person monitoring the door who can act quickly if anything suspicious occurs.
- Watch this video to learn more.
April 12th is Identity Management Day
Whoo hoo! Do we get the day off? Sadly, no, but you should take a few minutes that day (or before) to:
|