-
Accessing HelloSign: Important Update
Due to recent changes implemented by HelloSign (now part of Dropbox Sign), the service is no longer accessible through the Google App Launcher, often referred to as the “waffle” menu. Users who previously relied on this quick-access feature will need to adjust their workflow to continue using HelloSign. To access HelloSign moving forward, go directly… Read more »
-
Critical Windows Server Updates Must Be Installed
DHS has issued Emergency Directive 20-03 on this vulnerability which can be viewed here: https://cyber.dhs.gov/ed/20-03/. (Article quoted below for posterity)Here is a description of the vulnerability:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350 (Article quoted below for posterity)Please note that while the vulnerability only affects servers with DNS services, Cyber is required to report on the patch status today (July 20, 2020) and… Read more »
-
Windows 10 Lifecycle and the Need to Update Your System Regularly
By Tammera E Campbell on 2020-07-09T15:35:45Z Microsoft has taken a different approach to updating Windows 10, as they release major builds twice a year. Each build will have an end of lifecycle and will cease to be supported as defined by their End of Service date. Users should know that they must regularly commit to… Read more »
-
Avoid Cyber Blocking, Address Windows 7 Now!
As of January 14, 2020 Microsoft stopped support of Windows 7. Computers running Windows 7 will no longer receive security patches. Most machines are able to upgrade to Windows 10 Read more »
-
Apple Remote Management Service Abuse
Berkeley Lab Cyber Security has discovered bad guys exploiting Apple’s Remote Management service to conduct reflected denial-of-service (DoS) attacks. In order to protect Berkeley Lab computers from participating in this hostile activity, we require all users to disable Apple Remote Management Service. Read more »
-
Update Your Windows System NOW!
On March 12, 2020 Microsoft released a warning to immediately update and reboot Windows systems due to a Microsoft SMBv3 Client/Server Remote Code Execution Vulnerability. Users are advised this is an extremely dangerous vulnerability and MUST be addressed right away.Users should know that if their systems are not patched appropriately and an attack is launched… Read more »
-
Critical Windows 10 Updates Must Be Installed
Berkeley Lab IT has released Microsoft’s latest updates for Windows 10, which contains patches for multiple critical security vulnerabilities. One of these, CVE-2020-0601, has been identified by the Cyber Security group as a mandatory update. As such, all Windows 10 systems at the Lab MUST be updated, and may be blocked from the network if… Read more »
-
Update Firefox Now!
Just as your operating systems need to be patched, so do your browsers. Mozilla recently disclosed a critical vulnerability in Firefox, and advises all users to patch it immediately:Mozilla Patches Critical VulnerabilitiesSecurity Advisories for FirefoxIf Firefox is configured to update automatically, patching is as simple as restarting your browser. Users should verify they are running… Read more »
-
[Completed] January 9, 2020 – PMP Application
The PMP Application (pmp.lbl.gov) will be offline between 1:00 PM and 2:00 PM for a system upgrade. Read more »
-
IT Known Issues with Latest macOS Catalina
IT Workstation Support has catalogued the recent issues users have encountered when upgrading their system to the latest macOS Catalina. They are: 32-bit applications will not run on Catalina, see table below Top 10 32-bit Applications in-use Name Quantity Cisco VPN 277 Microsoft Word, what version? 163 Microsoft Excel, what version? 116 Microsoft Powerpoint, what… Read more »
-
CCleaner Not Authorized On Lab Computers, Must Be Removed
As of Oct 17, 2019 Workstation Support is under guidance from LBL cybersecurity to remove CCleaner from all Lab systems.Computers that have BigFix (Active Mode) installed will have a pop-up appear informing the user of the action and provide a button to click for easy uninstallation.We are looking at other options to handle the functions… Read more »
-
Multi-Factor Authentication Countdown
December 9th, the beginning of MFA enforcement for all staff, affiliates, and contractors is quickly approaching.All LBL users must activate MFA for their Berkeley Lab enterprise accounts by this date, or risk losing access to email, LETS, and all other services protected by their Berkeley Lab Identity.Visit go.lbl.gov/mfa to get started today. Read more »
-
Malwarebytes Enterprise License Retired
Just a reminder that on June 1, 2019, Malwarebytes was no longer being offered by Berkeley Lab IT. Existing clients will continue to function, but will not receive updates. IT recommends that users uninstall Malwarebytes. This can be done manually, or users can wait until they see a BigFix Offer from IT, which will remove… Read more »

Keep in Touch
Continue visiting our website to view the latest in IT news and updates impacting Berkeley Lab staff and affiliates.
Contact IT Communications at itcomms@lbl.gov for questions and feedback regarding IT news, the IT website, or monthly newsletter.