my.ryerson service disruption: Friday Nov. 8 2013, 11:27 AM – 11:40 AM

One of the my.ryerson portal servers became unresponsive at approximately 11:27 AM this morning and caused a service disruption for users who were on this server.  The server was restarted at 11:40 AM and the service was restored.  We are continuing to investigate the cause.

Please accept our apologies for any inconvenience this may have caused.

-Computing and Communications Services

 

Posted in All Categories, my.ryerson | Comments Off on my.ryerson service disruption: Friday Nov. 8 2013, 11:27 AM – 11:40 AM

Slow wireless at TRS – Thursday, November 7, 2013 from 5:00 AM to 4:00 PM

On Thursday, November 7, 2013, at 5:00 AM , one of the links to the wireless controller in TRS started to show some intermittent errors.  This caused slower than usual wireless access in that building. The link was taken out of service at 4:00 PM for further troubleshooting.

Please accept our apologies for this performance problem.

-Computing and Communications Services

Posted in All Categories, wireless | Tagged | Comments Off on Slow wireless at TRS – Thursday, November 7, 2013 from 5:00 AM to 4:00 PM

RMS outage – Admin, Self Service and Activation – Tuesday, Nov. 5, 2013 1:20 PM – 1:22 PM

On Friday, November 1, 2013 an update to RMS created an issue with the creation of a  Google Token (used to connected a mobile device to Ryerson Gmail).  The fix for this issue was deployed this afternoon resulting in  the back-end server that all RMS web applications connect to being restarted at 1:20 PM this afternoon.  Service was fully restored at 1:22 PM.  RMS is the system that makes possible account activation at http://www.ryerson.ca/accounts/ and provides the password change, Google Token setup  and other features via “Manage my Online Resources” inside the my.ryerson.ca portal.

Please accept our apologies for the disruption in service.

-Computing and Communications Services

 

Posted in All Categories | Comments Off on RMS outage – Admin, Self Service and Activation – Tuesday, Nov. 5, 2013 1:20 PM – 1:22 PM

my.ryerson portal currently unavailable – Monday, Nov. 4 @ 1:36 pm

The virtual web servers that are used as from ends for my.ryerson.ca are currently unresponsive.

Technical support staff is currently investigate the cause of the problem.

Update 4:00 PM: CCS began taking steps at roughly 2:30 to return the portal to service however full access was not restored until after 3 PM.

Please accept our apologies for the disruption in service.

-Computing and Communications Services

Posted in All Categories, Blackboard, eHR, my.ryerson, RAMSS | Tagged , , , | Comments Off on my.ryerson portal currently unavailable – Monday, Nov. 4 @ 1:36 pm

Library network outage Monday, Nov. 4 2013 10:52 AM – 11:06 AM

On Monday November 4, 2013, during an attempt to add a network switch to the library, electric power was lost in one of the network closets. This caused a network outage for most of the library labs and offices (including wireless access). The outage lasted  from 10:52 AM to 11:06 AM.

Please accept our apologies for the outage.

-Computing and Communications Services

Posted in All Categories, network | Tagged | Comments Off on Library network outage Monday, Nov. 4 2013 10:52 AM – 11:06 AM

RMS web services disruption: Thursday, Nov. 31 2013 1:00 AM – 9:00 AM

The RMS server running the web services for RMS Admin, RMS Activation, RMS Selfserv and Phone Directory crashed this morning, Thursday Nov. 31, 2013 at approximately 1AM.   Services were unavailable until 9AM.

Technical support staff continue to investigate the cause of the problem.

Please accept our apologies for the disruption in service.

-Computing and Communications Services

Posted in eResources | Comments Off on RMS web services disruption: Thursday, Nov. 31 2013 1:00 AM – 9:00 AM

my.ryerson service disruption: Tuesday Oct. 29 2013, 1:15 PM – 1:38 PM

One of the my.ryerson portal servers became unresponsive at approximately 1:15 PM due to a memory issue. This  caused a service disruption for the users who were using that server.  The server was restarted at 1:38 PM and the service was restored.

Please accept our apologies for any inconvenience this may have caused.

-Computing and Communications Services

 

Posted in All Categories | Comments Off on my.ryerson service disruption: Tuesday Oct. 29 2013, 1:15 PM – 1:38 PM

Network outage for Fashion and KHW-338 labs: Fri, Oct. 25 2013 6:55 AM – 6:59 AM

On Friday October 25, 2013 a network  distribution switch had to be rebooted to clear up high CPU utilization. This caused a network outage for the sub-nets servicing the  Fashion lab and KHW-338 lab. The outage lasted from 6:55 AM to 6:59 AM.

Please accept our apologies for the outage.

-Computing and Communications Services

Posted in All Categories, network | Tagged | Comments Off on Network outage for Fashion and KHW-338 labs: Fri, Oct. 25 2013 6:55 AM – 6:59 AM

Network Outage for Fashion and KHW-338 labs

On Tuesday October 22, 2013 a configuration error in one network  distribution switch caused a network outage for the sub-nets  servicing the  fashion lab and KHW-338 lab. The outage lasted from 7:30 AM to 8:45 AM.

Please accept our apologies for the outage.

-Computing and Communications Services

Posted in All Categories, network | Tagged | Comments Off on Network Outage for Fashion and KHW-338 labs

Security Advisory – Adobe Breach

On Oct 3, 2013, Adobe Systems Inc. announced that its network had been breached.  The cyber attack compromised information relating to Adobe’s 2.9 million customers, including payment data such as credit card numbers, as well as the source code for popular Adobe products, such as Adobe Acrobat, ColdFusion, and ColdFusion Builder.

[UPDATE: Nov.7, 2013] The number of affected Adobe customers has expanded to 38 million.  The source code theft now also extends to the Adobe Photoshop family of products.  It has been confirmed that the stolen passwords were poorly encrypted (instead of hashed, as is standard practice).  Security researchers have been able to retrieve many passwords from the stolen data.  Therefore, we reiterate the recommendation to promptly change passwords for Adobe accounts and apply all the latest updates to Adobe products as soon as possible.”

Adobe reported that the stolen payment card information was encrypted, thus the financial risk to its customers is not believed to be critical.  Nevertheless, the company has begun the process of notifying the affected customers, offering them free credit monitoring for one year.  Other account holders have been advised to reset their passwords as a precautionary measure.

The theft of the product source code poses a more significant concern, as it increases the likelihood and volume of zero-day exploits — malicious attacks against vulnerabilities that are not yet known to either the software developer or the public.  The best way for an Adobe user to safeguard against such attacks is to:

  • Ensure that Adobe software is kept up-to-date

  • To run only vendor-supported versions of the software

  • To apply all available security updates

The same hackers thought to be responsible are linked to major breaches of giant data aggregator companies earlier this year; they are also believed to be involved in the breach of PR Newswire this week.  Investigators have determined that these hackers specialize in attacking ColdFusion vulnerabilities.  With the source code in their possession, there is enormous potential for harm.

Soon after the breach, Adobe issued security updates for Adobe Reader and Acrobat.  Although the fixes are unrelated to the breach, it is strongly recommended that all users of Adobe Reader or Adobe Acrobat apply these updates immediately.  The same recommendation shall also apply to future updates unless otherwise advised.

Adobe Security Bulletin for Adobe Reader and Acrobat:

http://www.adobe.com/support/security/bulletins/apsb13-25.html

 

– Computing and Communications Services

Posted in All Categories | Comments Off on Security Advisory – Adobe Breach