Pacific update on the Heartbleed security flaw
University Information Services is actively responding to recently discovered Heartbleed security flaw.
University Information Services is actively responding to recently discovered Heartbleed security flaw. While most major Pacific web resources were not susceptible to this problem, a small number of services not commonly used by students did have the vulnerable OpenSSL software installed and running. These systems have been patched and UIS is working to update security certificates on all of our public servers to assure that our user accounts are secure.
If you have concerns about the privacy of your Pacific University account, you may change your PUNet Password at any time by going to the Pacific home page, clicking on the Online Tools link, then clicking on the myAccount button. You can find the Password tab under the Account Settings menu. It is strongly recommended that you do not use the same password for any other Internet site. If you are using the same password for sites outside Pacific, we recommend that you change your PUNet password now. To prevent being locked out of your account after the password change, please be sure to update your password anywhere you have your password saved on your computer or mobile devices.
For additional information on the Heartbleed security flaw, the Washington Post has a good overview in their article “Heartbleed: What you should know” http://preview.tinyurl.com/lfn9sgc.
Please contact the Technology Information Center at 503-352-1500 or by email at firstname.lastname@example.org if you have any questions regarding this maintenance announcement.
Reminder: University Information Systems (UIS) will never ask for your account, password, or personal information via email. Never reveal your password to anyone. If you are unsure whether a communication from UIS is legitimate, please contact the Technology Information Center.
Posted by Ted Krupicka (email@example.com) on Apr 10, 2014 at 10:40 AM
Edited by Tammy Spencer (firstname.lastname@example.org) on Apr 10, 2014 at 12:14 PM