Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

Service Alerts

Update - 5/10/2016, 11:00am - Yesterday's situation seems more stable than even last night and we continue to see infrequent message delays of 2-3 minutes. We are still monitoring but have no new information on the cause.

Update - 5/9/2016, 7:00pm - We are not seeing an obvious root cause of the problem. Things appear stable since servers are no longer disconnecting but we continue to see some warnings of mail delivery slowness. We'll continue to monitor the situation.

5/9/2016, 4:40pm - We have identified a problem with the ISC managed mail routers. The servers are intermittently dropping connections. We suspect this this behavior probably results in slowness in mail delivery but are still investigating. Please be aware that a problem with the mail routers will affect Exchange, Zimbra and PennO365 email services. We will send updates as we can.

ISC Networking and Telecommunications Email Service - Security Tips

From the ISC Information & Security Office:

While Penn may be closed for the winter break, most of us will continue to use our computers for business and pleasure. Don't let the holiday rush allow you to drop your guard. Below are 7 simple tips to help you identify and avoid phishing scams and to work securely off-campus during the Break.

Phishing:

  • No organization at Penn will ever ask you for your username and password via e-mail.
  • Double-check the URL of any websites you are being told to click on in e-mail messages, especially if once directed there, you are asked to login. Be suspicious if the message claims to be from Penn, but the URL goes to a .com, .org, .net, etc. address.
  • If you believe you have mistakenly clicked on a link or otherwise disclosed private information in a phishing attack, immediately change your e-mail and PennKey passwords.

Working Remotely:

  • Make sure you are working on a computer that has software with up-to-date security patches, the firewall setting turned on, and antivirus software installed.
  • Use a dedicated computer that no one else uses. If that's not possible, use Remote Desktop to reach your campus computer.
  • Don't use unsecured wireless hot spots at hotels, airports, coffee shops or other public areas.
  • Be especially careful about what data you store on portable devices, since they are more easily lost and stolen. Consider encryption or remote file deletion.
For more details, see:
top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania