Technology posts displayed by category

The Internet of Things

Cybersecurity Awareness Month: The Internet of Things

In the past, technology was relatively simple: You just connected your computer to the internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges.

The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues. In this newsletter, we help you understand what those risks are and what you can do to secure your IoT devices, your home, and your family.

Issues with IoT

Know what IoT devices you have connected to your network, isolate them often, keep them updated, and have strong passphrases.

The power of IoT is that most of these devices are simple. For example, you simply plug your coffee machine in and it asks to connect to your home Wi-Fi network. However, all that simplicity comes at a cost. The biggest problem with IoT devices is that many of the companies making them have no experience with security. Instead, their expertise is manufacturing household appliances. Or perhaps it is a startup trying to develop a product the most efficient, fastest way possible, such as on Kickstarter. These organizations are focusing on profits, not cybersecurity. As a result, many IoT devices purchased today have little or no security built into them. For example, some have default passwords that are well known, perhaps even posted on the internet, and cannot be changed.

In addition, many of these devices have no option or ability to configure them; you’re stuck with whatever was shipped. To make matters worse, many of these devices can be difficult to update or may not even have the capability. As a result, many of the IoT devices you are using can quickly become out of date with known vulnerabilities that cannot be fixed, leaving you permanently vulnerable.

Protecting Your IoT Devices

So what can you do? We definitely want you to leverage the power of IoT devices securely and effectively. These devices can provide wonderful features that can make your life simpler, help save money, and increase the physical security of your home. In addition, as the technology grows, you may have no choice but to purchase or use IoT devices. Here are steps you can take to protect your IoT devices and yourself:

  • Connect only what you need: The simplest way to secure an IoT device is to not connect it to the internet. If you don’t need your device to be online, don’t connect it to your Wi-Fi network.
  • Separate Wi-Fi network: If you do need your IoT devices online, consider creating a separate Wi-Fi network just for them. Many Wi-Fi access points have the ability to create additional networks, such as a guest network. Another option is to purchase an additional Wi-Fi access point just for IoT devices. This keeps your IoT devices on an isolated network, where they cannot be used to harm or attack any computer or mobile devices connected to your primary home network (which is still the main interest of cyber criminals).
  • Update when possible: Just like your PC and mobile devices, keep your IoT devices up to date. If your IoT device has the option to automatically update, enable that.
  • Strong passwords: Change any passwords on your IoT device to a unique, strong passphrase only you know. Can’t remember all of your passphrases? Don’t worry, neither can we. Consider using a password manager to securely store all of them.
  • Privacy options: If your IoT device allows you to configure privacy options, limit the amount of information it shares. One option is to simply disable any information sharing capabilities.
  • Consider replacement: At some point, you may want to replace an IoT device when your existing one has too many known vulnerabilities that cannot be fixed or there are newer devices that have far more security built into them.

There is no one size fits all for every device, so it is worth checking for best practices and any publications on how to secure them. Unfortunately, most IoT devices were not developed with cybersecurity in mind, so many manufacturers do not provide much security information. But as awareness for cybersecurity grows, we hope to see more and more IoT vendors build security into their devices and provide more information on how to protect and update them.

Sarah SteinbergTechnologyOctober 16, 20180 comments
Read More
Cyber security logo

Cybersecurity Awareness Month: 10 Steps to Smartphone Security

Smartphones continue to grow in popularity and are as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer, because mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats:

  1.  Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones.
  2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.
  3. Back up and secure your data. You should back up all of the data stored on your phone — such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased.
  4. Only install apps from trusted sources. Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such thing as: checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to your phone’s contents. There also are apps that warn you if any security risks exist on your phone.
  5. Understand app permissions before accepting them. You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone. Make sure to also check the privacy settings for each app before installing.
  6. Install security apps that enable remote location and wiping. An important security feature widely available on smartphones, either by default or as an app, is the ability to remotely locate and erase all of the data stored on your phone, even if the phone’s GPS is off. In the case that you misplace your phone, some applications can activate a loud alarm, even if your phone is on silent. These apps also can help you locate and recover your phone when lost. Visit CTIA for a full list of anti-theft protection apps.
  7. Accept updates and patches to your smartphone’s software. You should keep your phone’s operating system software up to date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.
  8. Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or sensitive information. Always be aware when clicking web links and be particularly cautious if you are asked to enter account or login information.
  9. Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose of your old phone. To protect your privacy, completely erase data off your phone and reset the phone to its factory settings. Then, donate, resell, recycle, or otherwise properly dispose of your phone.
  10. Report a stolen smartphone. The major wireless service providers, in coordination with the Federal Communications Commission (FCC), have established a stolen phone database. If your phone is stolen, you should report the theft to your local law enforcement authorities and register the stolen phone with your wireless provider. This will provide notice to all the major wireless service providers that the phone has been stolen and will allow for remote “bricking” of the phone so that it cannot be activated on any wireless network without your permission.

For more information and resources on mobile and cybersecurity, visit the FCC’s website and the Department of Homeland Security’s Stop.Think.Connect.

Sarah SteinbergTechnologyOctober 9, 20180 comments
Read More

The President’s Message

Check out the October issue of The President’s Message. It includes Dr. Perman’s column on Promise Heights’ game-changing $30 million grant; a look ahead to Founders Week; President’s Symposium and White Paper Project tackles gun violence; John T. Wolfe Jr. talks disruption and diversity at DAC Speaker Series; UMB leaders discuss policing and emergency management; new CURE Scholars documentary to air on MPT; “I’m new to Twitter — come say hello @JayPerman;” and a roundup of student, faculty, and staff achievements.

Chris ZangABAE, Bulletin Board, Clinical Care, Collaboration, Contests, Education, For B'more, People, Research, Technology, UMB News, University Life, USGAOctober 8, 20180 comments
Read More

Meet the Makers: Dr. Luana Colloca

Luana CollocaJoin the Health Sciences and Human Services Library for Meet the Makers, its speaker series focusing on emerging technologies in the life sciences, on Oct. 17, noon to 1 p.m., in the Gladhill Board Room on the fifth floor of the library.

Luana Colloca, MD, PhD, MS, of the University of Maryland schools of medicine and nursing will deliver the lecture titled, “The neurobiology of pain modulation: From placebo effects to virtual reality”.

“The capacity to activate endogenous opioid and nonopioid systems in concomitance with the administration of an intervention represents a fascinating phenomenon that is capturing the attention of scientists from different disciplines,” Colloca says. “This lecture focuses on the neurobiology of placebo effects and virtual reality with an emphasis on relevant discoveries, new insights and developments.”

A light lunch will be provided.

Please RSVP at this link.

Brian ZelipResearch, TechnologyOctober 5, 20180 comments
Read More
Cyber security logo

Cybersecurity Awareness Month: Make Your Home a Haven for Online Safety

Every day, parents and caregivers teach kids basic safety practices — like looking both ways before crossing the street and holding an adult’s hand in a crowded place. Easy-to-learn life lessons for online safety and privacy begin with parents leading the way. Learning good cybersecurity practices can also help set a strong foundation for a career in the industry.

With family members using the internet to engage in social media, adjust the home thermostat, or shop for the latest connected toy, it is vital to make certain that the entire household — including children — learns to use the internet safely and responsibly and that networks and mobile devices are secure. Week 1 will underscore basic cybersecurity essentials the entire family can deploy to protect their homes against cyber threats.

Three Things You Can Do Today to Protect Your Home and Family

Most of us probably remember our parents advising us to look both ways before crossing the street or to never touch a hot stove. But how many of us can recall parental guidance — or have talked to our own children — about how to secure our social media accounts or how to protect our laptops from hackers?

Cybersecurity isn’t just for the workplace. Technology permeates our daily lives, helping us to connect, create, and cool off. We take our tech home, using smartphones to play music or stream movies when we aren’t answering emails. As the number of devices per household continues to grow, more children are being exposed to more technology in less time.

It’s our responsibility as consumers and family members to be aware of our own security and understand how each of us is empowered to protect it.

1. Engage with your family about the way they use technology.

Communication is important in relationships, whether with a partner or a family. Take the time to talk about technology — and we don’t mean just to share the Wi-Fi password.

For the parents among us, get involved with the technology your children use. What apps and social media sites are helping them connect with friends? What information are they sharing through texts and social media, and with whom? Are they aware of fake profiles, Fortnite scams, and other tricks used by cybercriminals?

Understanding how your children engage with devices and online services will help you protect them from dangers they may not be aware of. Help them understand that they’re in control of their accounts’ privacy settings and what they share, and that a little caution can save a lot of embarrassment and regret down the road. As an added bonus, your tech talks might give you some gift ideas for the approaching holiday season!

2: Change that Wi-Fi password!

Most home routers come out of the box with a default SSID (network name) and password. Usually, this information is printed on a label, and many people never change it. Problem is, most of these passwords also are posted online and are easy for hackers (and neighbors) to find. Some routers might not even require a password by default!

If someone can log in to your router, they can view your connected devices, change your network settings, and even lock you out of your own network. This year, the FBI warned consumers to reset their router passwords in response to an outbreak of Russian malware that allowed hackers to do exactly those things. Even if the hackers don’t poke around, they can use your home like a free hotspot as long as they’re in range (in which case you’d better hope they’re not up to anything illegal!).

Your home has a front door, and so does your network. Make sure you keep both locked tight.

3: Make sure your family’s devices are all password (or fingerprint) protected.

Computers and smartphones include password protection features that you can enable in system settings. Most newer phones and laptops also include biometric protection features such as fingerprint scanners or facial recognition. Some devices may ask you to create passwords or biometric profiles when you first configure them or when you update their operating system. There’s a good reason for that.

If your device doesn’t have a password, anyone who picks it up can view your pictures, messages, and other data. Your thief may place a few Amazon orders in your name or meddle with other open apps.

Setting a strong password or using biometric authentication prevents thieves from stealing your data, even if they manage to get their hands on your computer or phone. It also helps prevent your significant other or your kids from snooping on or pranking you.

Sarah SteinbergTechnologyOctober 4, 20180 comments
Read More
If you could have 3 library wishes, what would they be?

Submit Your Wishes to the HS/HSL Library Genie

How can the Health Sciences and Human Services Library better meet your needs? Would you like to see the library’s space designed differently? Are there any new technologies you would like to see? Are there additional resources and services you would like provided? Now is the chance to make your wishes known.

The Library Genie is accepting wishes through Oct. 31. Submit three Library Wishes to the Library Genie today!

All wishes are anonymous, but if you’re willing to talk about them, please include your name and email address.

Thanks for your input, and happy wishing!

Everly BrownEducation, People, Technology, University LifeOctober 1, 20180 comments
Read More
Join us for Wikipedia Training on Oct. 10

Wikipedia Edit-A-Thon Training at HS/HSL

Are you interested in helping improve a resource students, faculty, staff, and the community use daily?

Come to the Health Sciences and Human Services Library (HS/HSL) on Oct. 10 to learn how to become a Wikipedian and participate in the National Network of Libraries of Medicine’s  second Edit-A-Thon. The event will take place from 11 a.m. to 12:30 p.m. on the lower level of the HS/HSL, Room LL05.

During this training, librarians will help you make a Wikipedia account, make edits in Wikipedia, and use trusted National Library of Medicine (NLM) resources to improve the world’s largest encyclopedia. This workshop will help prepare you for the #citeNLM2018 Fall Edit-A-Thon, which will take place at HS/HSL on Nov. 7 and focus on women’s health. Your participation will help contribute to WikiProject Medicine.

Learn more about WikiProject Medicine or the NNLM Edit-A-Thon.

Register for Wikipedia Edit-a-thon Training.

Lauren WheelerCollaboration, Education, People, Research, TechnologyOctober 1, 20180 comments
Read More
Connective Issues: Volume 12, Issue 4

Check Out the Latest ‘Connective Issues’ Newsletter

The September 2018 issue of the Connective Issues newsletter from the Health Sciences and Human Services Library is now available.

Included in this issue:

  • Welcome — Expertise, Resources, Place!
  • Doing Research?
  • Meet the Makers — The Neurobiology of Pain Modulation: From Placebo Effects to Virtual Reality
  • Wikipedia Edit-a-thon at HS/HSL
  • The Library Genie Returns Oct. 1
  • Outbreak: Epidemics in a Connected World
  • Scholarly Publishing Workshop Series
  • Showcasing and Preserving UMB CURE Scholars’ Works
  • Meet Your Librarian
  • Top 10 Reasons to Love the HS/HSL
  • The “Spanish” Influenza Pandemic in Baltimore, 1918-1919
Everly BrownClinical Care, Collaboration, Education, Research, Technology, USGASeptember 27, 20180 comments
Read More
Scholarly Publishing Workshop Series.

Scholarly Publishing Workshop Series at HS/HSL

During this year’s Open Access Week, the Health Sciences and Human Services Library (HS/HSL) will be hosting a Scholarly Publishing Workshop Series. Please join us for a series of 30-minute workshops introducing topics related to scholarly publishing and research impact.

Choosing the Right Journal for Your Research

Tuesday, Oct. 23, noon-12:30 p.m.
Do you struggle with finding a journal that’s the perfect fit for your research? We can help! In this 30-minute workshop, we will discuss tools and strategies you can use to identify the journal that best matches your work. Feel free to come with a current manuscript or just to learn approaches for the future.

Open Access and Predatory Publishing 

Tuesday, Oct. 23, 12:30 p.m.-1 p.m.
Are you confused about different models of Open Access publishing? Are you wondering if Open Access journals are trustworthy? Are you trying to locate a legitimate Open Access journal to submit your manuscript? In this workshop, we will talk about what Open Access is, why you should consider publishing in an Open Access journal, how to evaluate a reputable publisher, and how to differentiate predatory journals and publishers.

Author IDs

Wednesday, Oct. 24, noon-12:30 p.m.
This 30-minute workshop will cover three author IDs — ORCID, Google Scholar, and Scopus. We will discuss the differences among them and why they can help boost your research impact. The workshop will be followed by a 30-minute open session to give you time to try the tools introduced in the Author IDs workshop and allow you to ask individual questions about your author IDs.

Enhancing Your Research Impact

Thursday, Oct. 25, noon-12:30 p.m.
This 30-minute workshop will walk you through methods for enhancing the impact of your research. Topics will include establishing your scholarly identity, making strategic publishing decisions, and enhancing the discoverability of your work. The workshop will be followed by a 30-minute open session to test these strategies and ask questions about your individual research impact.

To register, please use the links above or fill out the form here. Registration is encouraged but not required.

Emily GormanBulletin Board, Education, Research, TechnologySeptember 25, 20180 comments
Read More
Office 365

Office 365: The Modern Workplace

We have been utilizing Office 365 at the University of Maryland, Baltimore for the past few years. Office 365 offers many tools and services that are all geared to make our work lives easier, more accessible, and more flexible. It started small — we first focused on OneDrive, Office Online, and how to access these tools through the Office 365 Portal. Then we introduced SharePoint, which allows for team collaboration. Shortly thereafter came Teams, which is another team collaboration tool.

We’ve been gradually adding more features and programs to the UMB Office 365 workspace; however, each of these tools was a standalone. You could use one, or two, or maybe all of them — but each one was used as its own distinct tool.

This is changing! Because of Microsoft’s continuing efforts, the Office 365 platform is now mobile-friendly, robust, and beneficial, due to the new modern workplace.

What Is the Modern Workplace?

Using Office 365, the modern workplace provides an environment where people can store, sync, and securely share their work files across multiple devices and access them anywhere, anytime. It utilizes numerous real-time collaboration tools to improve how working groups and teams access content and collaborate, thus improving communication and productivity. These tools enable individual users to access and share files, emails, discussions, calendars, videos, and many other programs with their teams and other teams across the campus.

What Exactly Is Changing?

If you’ve been using any of the Office 365 tools, you may wonder what exactly does this mean, how will things be different?

When we first introduced Office 365 at UMB, each tool was promoted as serving a specific function. With the updates by Microsoft, all the tools we’ve had access to are now intertwined and serve many functions.

  • OneDrive is still used for your personal work files, but OneDrive also is an access point for ALL of your files — regardless of where they are stored or who they are shared with.
  • For team collaboration, instead of having to choose between SharePoint and Teams, your department/group/project team now gets both. If you are a part of a number of different groups, Office 365 provides easy access to all of them.
  • Teams offers a chat-based approach to communication to quickly and easily communicate with your team.
  • Additional tools, such as Office Online, OneNote, and Planner, can be used in conjunction with all of the above.

Using the Office 365 modern workplace provides a more seamless approach to information you need to complete your job from any location AND ways for you to discuss it with others in your team — whether that’s a department, cross-campus group working on a project/committee/initiative, student organization, multiple departments collaborating on a common project, or an ad-hoc group that needs to discuss a topic.

Please keep an eye out for new and updated Office 365 classes and sessions to help you learn more about Office 365 as the modern workplace. We’ll be announcing them soon!

Sarah SteinbergCollaboration, People, TechnologySeptember 24, 20180 comments
Read More
Flow Cytometry Graphic

UMGCCC Flow Cytometry Shared Services Lecture Set for Oct. 8

The University of Maryland Marlene and Stewart Greenebaum Comprehensive Cancer Center (UMGCCC) Flow Cytometry Shared Services monthly flow lecture will be held Monday, Oct. 8, 10:30 a.m. to noon, at the Bressler Research Building, Room 7-035.

The lecture will be led by Xiaoxuan Fan, PhD, the School of Medicine, and you will learn:

  • How flow cytometry works
  • Multi-color design and compensation
  • Instruments and services
  • New technology and tools
  • Online booking system

The lecture is free, but you need to reserve your spot at this link.

All are welcome, and this lecture is required for those who want to be “trained users” at the UMGCCC FCSS facility.

Karen UnderwoodBulletin Board, Collaboration, Community Service, Education, Research, TechnologySeptember 19, 20180 comments
Read More
Info-Security-900x900

How to Stop ‘Spear Phishing’

The Center for Information Technology Services has received reports of email messages sent to University of Maryland account holders that look very official and are created to get the account holder to give up personal information. The messages warn of a variety of account problems.

Suspicious Email Messages

  • Compromised accounts are being restricted
  • Account deletion is being conducted in preparation for a system upgrade
  • Unused accounts are being deleted
  • Mailbox storage limit has been reached
  • Accounts are being migrated to a new system
  • A maintenance process to fight spam is being conducted
  • An urgent request from a supervisor or manager to transfer a large sum of money immediately

These emails, themselves a type of spam, request that you visit a link to verify your account or reply to the message with your directory ID, password, as well as full name and contact information.

DO NOT DO THIS!

These emails are an attempt (called “phishing”) by someone to gain access to personal information, which they should not have. The “From” address is forged (or “spoofed”), and may or may not be an actual email address, but it is not where the email actually originated. Targeted versions of phishing have been termed “spear phishing.”

What to Do If You Receive a Phishing Message

First, do not respond to the phishing message for any reason, including trying to scold or taunt the sender.

Second, send the message to spam@umaryland.edu as an attachment (see instructions link below). With the entire phishing email in its original format, the administrators can get the information needed to adjust the IronPort filters to block future phishing messages from this sender.

Instructions on how to send an email as an attachment

What to Do If You Have Responded to a Phishing Message

If you responded to a phishing message with your password, please email or call the IT Help Desk and change your password immediately.

If you still have a copy of the original phishing message, send the message to spam@umaryland.edu as an attachment. With the entire phishing email in its original format, the administrators can get the information needed to adjust the IronPort filters to block future phishing messages from this sender.

Sarah SteinbergTechnology, UMB News, University LifeSeptember 17, 20180 comments
Read More
To sign or not to sign ... UMBEIN.ORG

Sept. 27 Workshop: ‘Dealing with Non-Disclosure Agreements’

You’ve been asked to sign a non-disclosure agreement (NDA) — how should you respond?

In a Sept. 27 workshop titled “Dealing with Non-Disclosure Agreements” from the Entrepreneurship and Innovation Network student group, the use of NDAs to protect confidential information that may be exchanged during discussions or negotiations between companies will be discussed.

The workshop will review standard terms in an NDA and highlight problematic provisions that you might want to avoid. It also will touch on confidentiality provisions in employment and independent contractor agreements and other types of contracts.

Here are the details:

 

Edwin OakBulletin Board, Collaboration, Education, For B'more, People, Technology, UMB News, University Life, USGASeptember 13, 20180 comments
Read More
Precision Health and the National Library of Medicine: From Accelerating Discovery to Improving Health and Well-Being

National Library of Medicine Director to Present on ‘Precision Health’

Patricia Brennan, PhD, RN, FAAN, FACMI, director of the National Library of Medicine, will present “Precision Health and the National Library of Medicine: From Accelerating Discovery to Improving Health and Well-Being” on Thursday, Oct. 11, 4 p.m. to 5:30 p.m., in the School of Nursing Auditorium. This event is free and open to the public, and a reception will follow.

The National Library of Medicine is the world’s largest biomedical library and the producer of digital information services used by scientists, health professionals, and members of the public worldwide. As the library prepares for its third century, Brennan is leading development of strategies to ensure that information critical for discovery and care is available where needed, when needed, and increasingly in the format needed. She became the library’s 19th director in August 2016.

A pioneer in the development of information systems for patients, Brennan brings more than 30 years of experience in biomedical informatics, spanning the application of game theory in the development of health information exchanges; the alignment of clinical information systems with professional practice models; and the design, deployment, and evolution of specialized computer tools to support self-management and self-care in the home. She holds a PhD in industrial engineering and a Master of Science in Nursing.

The lecture is co-sponsored by the following University of Maryland entities:

  • Biology and Behavior Across the Lifespan Organized Research Center
  • Center to Advance Chronic Pain Research
  • Center for Health Outcomes Research
  • Center for Health-Related Informatics and Bioimaging
  • Health Sciences and Human Services Library
  • Institute for Clinical & Translational Research
  • Institute for Genome Sciences
  • University of Maryland Marlene and Stewart Greenebaum Comprehensive Cancer Center

For more information, go to this School of Nursing webpage.

Giordana SegneriCollaboration, Education, People, Research, TechnologySeptember 11, 20180 comments
Read More
The President's Message (Septemer)

The President’s Message

Check out the September issue of The President’s Message. It includes:

  • Dr. Perman’s column on our Interprofessional Care Transitions Clinic, serving vulnerable patients with a team-based approach
  • The launch of the improved UMB mobile app
  • CURE Scholars and YouthWorks interns embrace summer learning at UMB
  • Congressional staffers get a sneak peek at Health Sciences Research Facility III
  • UMB Foundation matches employee gifts made through the “Proud to work here. Proud to give here.” campaign
  • A look ahead to UMB Night at the Ballpark on Sept. 14, Dr. John T. Wolfe Jr.’s diversity presentation on Sept. 17, and Dr. Perman’s Q&A on Sept. 18
  • UMB Police Force and community residents mix and mingle at National Night Out
  • And a roundup of student, faculty, and staff achievements
Chris ZangABAE, Bulletin Board, Clinical Care, Collaboration, Community Service, Contests, Education, For B'more, People, Research, Technology, UMB News, University Life, USGASeptember 6, 20180 comments
Read More