Information Technology Services

Apple Battery Recall

Information Technology Services (ITS) has learned that Apple determined the battery in a limited number of older generation 15-inch MacBook Pro laptops may overheat and pose a fire safety risk. Affected laptops were sold primarily between September 2015 and February 2017, and product eligibility is determined by the product serial number. The batteries have been recalled and require replacement.

With the holiday travel season approaching, Mac users need to be aware of the flight risk affected batteries pose and that laptops may be denied at airport security checkpoints. Last week, a Mason customer flying internationally was not allowed to board his flight with an unaffected MacBook Pro. Due to this occurrence, ITS is recommending that if users will be flying with any model of MacBook Pro, to visit the Apple Battery Recall site and determine if their computers are at risk. Following the assessment, ITS advises users to carry the confirmation that their Mac is unaffected with them while traveling.

Managed university-owned Apple laptops:

ITS assessed all managed MacBook Pro laptops and addressed those that were a risk.

Unmanaged university-owned or personal Apple laptops:

  1. Check to see which 15-inch MacBook Pro you have. Choose About This Mac from the Apple menu in the upper-left corner of your screen.
  2. Visit the Apple Battery Recall site at https://support.apple.com/15-inch-macbook-pro-battery-recall to enter your computer’s serial number and see if it is eligible for a replacement battery.
  3. If your MacBook Pro laptop is eligible, please stop using it and contact the ITS Support Center for assistance.

If you have any questions, please contact the ITS Support Center at 703-993-8870 or [email protected].

 

Apple Mail iOS 13 Issue

Information Technology Services (ITS) has become aware of a known issue with iOS 13 Apple Mail app users. ITS is receiving reports from users of intermittent problems when forwarding email through the app. These emails are at times being shortened and are not including the body of the email.

Due to this issue, ITS is recommending impacted users to switch from the Apple Mail app to Outlook for iOS. The app can be downloaded from the Apple app store. For information on the Outlook app, please visit https://apps.apple.com/us/app/microsoft-outlook/id951937596.

While Apple is aware of this problem, they have not yet provided an explanation for the truncating of emails. Following, ITS is not aware of any set solution at this time but will continue to investigate as more information becomes available.

If you have any questions, please contact the ITS Support Center at 703-993-8870 or [email protected].

Updated Status on November 18, 2019 1 p.m.:
Apple recommends updating to iOS 13.2.3 which includes bug fixes and improvements for your iPhone. Visit ITS Resolved Issues for more information.

Two-Factor Authentication Verification Changes

Information Technology Services (ITS) is enhancing the Two-Factor Authentication (2FA) program at Mason. The first phase of this effort is to simplify authentication options to align with current security standards.

Effective November 19, 2019, users will need to use the Duo Mobile App (Duo Push or Passcodes), a Yubikey, or Bypass Codes as their second factor. Telephone calls and SMS text messages will not be available as they are no longer considered secure. If the Duo Mobile App is enabled on your phone, you use a Yubikey, or have Bypass Codes; you are ready for the transition. If not, you will need to take action to get ready. Updates and information about preparing for the change are available on the 2FA Roadmap page.

If you have any questions, please contact the ITS Support Center at 703-993-8870 or [email protected].

Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month and Information Technology Services (ITS) is observing this year’s theme “Own It. Secure It. Protect It.” NCSAM encourages all computer users to practice online safety and security.

ITS has several events planned in observance of NCSAM including:

  • Thursday, October 3, 3 p.m. (Johnson Center, Room G): Ben Scribner from the Department of Homeland Security will speak. He is the section chief for the Stakeholder Engagement Division in the Cybersecurity and Infrastructure Security Agency.
  • Thursday, October 10 (Johnson Center, Kiosk C) and Wednesday, October 30 (Johnson Center, Kiosk D) from 11:30 a.m. to 1 p.m.: The IT Security Office staff will be on site to answer questions and talk about online safety and security with the Mason community.The team will also have giveaways.
  • Thursday, October 17, 3 p.m. (Johnson Center, Room E): Dr. Kathy Laskey from the Volgenau School of Engineering will speak. She is a professor of System Engineering and Operations Research as well as the Associate Director of Mason’s Center of Excellence in Command, Control, Communications, Computing, and Intelligence (C4I Center).

During NCSAM, all Mason employees are encouraged to complete their annual IT Security Awareness Training. Employees can find the training in their Mason Learning, Evaluation, and Performance System (MasonLEAPS) accounts. Log in via masonleaps.gmu.edu using your NetID and Patriot Pass Password. Select “IT Security Awareness Training” in the “Your Action Items” box to the right.

 

 

Chegg Data Breach Impacts Mason Students

In September 2018, a data breach from Chegg.com, a company that offers textbook rental and tutoring services, exposed the information of 40 million customers, some within the Mason community. The data that was breached included usernames, email addresses, shipping addresses, and passwords. Recently this information was discovered on publicly accessible sources and now poses a significant threat. At this time, there is no information from Chegg about the cause of the breach.

Information Technology Services (ITS) has reached out directly to those that have been identified as part of this breach but advises anyone who signed up for Chegg.com using their Mason email addresses (@masonlive.gmu.edu or @gmu.edu) to update their account passwords to avoid possible account compromise.

What you should do:

  • If you have used Chegg.com, ITS advises that you reset your MasonLive Microsoft Account Password and Patriot Pass Password immediately. To reset your passwords, visit password.gmu.edu.
  • If you have not heard from Chegg directly about your stolen account information, you should go to the Chegg website and change your password immediately.
  • ITS strongly recommends you create unique passwords across multiple services and sites; you should update your passwords on other websites (i.e. Amazon, banking, social media, etc.) that may have used your Chegg password.