Important Zoom Security Update

Starting September 27, Zoom will require that all meetings are protected with a passcode or waiting room. Since April, most newly scheduled Harvard Zoom meetings have been passcode protected by default. However, this change may impact: Meetings hosted using a personal meeting link or ID (PMI) Meetings scheduled before April 8, 2020 (including recurring meetings) … Continue reading “Important Zoom Security Update”

2-Step Verification coming to VDI: 8/17/20

What is Virtual Desktop Infrastructure (VDI)? VDI is a computing service available to students, staff, and faculty that works by moving the user’s desktop environment from a physical computer to a remote-accessible, central host computer. This means the computer you actually use for tasks such as word processing, email, and internet browsing is not the … Continue reading “2-Step Verification coming to VDI: 8/17/20”

Zoom 5 is here – upgrade today!

April 30th, 2020 A new version of Zoom (Zoom 5.0.4) is now available for upgrade that makes significant security and usability improvements.  Zoom 5 will become required for all Zoom customers as of May 28th. We strongly encourage all of our Zoom users to upgrade today to take advantage of the new features! A more … Continue reading “Zoom 5 is here – upgrade today!”

COMPLETE: Harvard Phone Maintenance: 2/24/20, 7pm – 11pm

A CISCO security vulnerability for Harvard Phone devices was identified last week. HUIT Communication and Collaboration Services has been working with Verizon on a firmware upgrade for all phones to resolve the vulnerability. HUIT will perform this upgrade through an evening maintenance window on Monday evenging, 2/24/10.  Some time between 7-11 PM phones will reboot … Continue reading “COMPLETE: Harvard Phone Maintenance: 2/24/20, 7pm – 11pm”

Security patch may affect non-HSPH managed servers

Harvard Universtiy IT (HUIT) is conducting a domain-wide rollout of a security policy that is designed to mitigate a risk called the LLMNR Responder Vulnerability. The remediation works by using a Group Policy Object (GPO) to run a script on each Windows PC which then protects systems from LLMNR attacks by disabling multicast name resolution … Continue reading “Security patch may affect non-HSPH managed servers”