Document Destruction
Document DestructionUpdated January 31, 2013Why Have Document Destruction Activities?Document Destruction Activities provide a focused opportunity for RIT faculty and staff to archive securely or...
View ArticlePrinter Best Practices
Printer Best PracticesPrinters often handle RIT Confidential information, but they can easily be overlooked when securing a network. Use the following best practices to secure any printers you...
View ArticleMedia Disposal Recommendations
Media Disposal RecommendationsMediaDisposal MethodPaperUse a shredder. Crosscut is preferred over a strip shredder.CD, DVD, diskette, etc.Use the media shredder (located at the ITS HelpDesk,...
View ArticleSafe Social Networking and Blogging
Safe Social Networking and Blogging Social networks are great. They do present some security challenges and risks, however. This guide describes the dangers you face as a user of these websites, and...
View ArticleE-mail at RIT
E-mail at RIT E-mail is a standard communication tool. Unfortunately, it is also an ideal channel for social engineering and phishing attempts; protect yourself and your information. Managing Your RIT...
View ArticleHost Intrusion Prevention (RIT-owned/leased computers only)
Host Intrusion Prevention (RIT-owned/leased computers only) Note:This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run...
View ArticleSecurity Assessment Tools
Security Assessment ToolsThe following tools should be used in combination to conduct security assessments.ToolDescriptionRapid 7 Nexpose (RIT Enterprise Licensed by ISO)Unified vulnerability...
View ArticleVirtual Private Networks
Virtual Private NetworksA Virtual Private Network (VPN) is a technology that allows for secure transmissions across the Internet between two networks by using a secure "virtual tunnel." Without using...
View ArticleWireless Networking
Wireless Networking Wireless networks are generally considered to be less secure than wired networks; however, with proper configuration and encryption enabled, they can provide more than adequate...
View ArticleOnline Safety
Online Safety Everyone connected to the Internet is a potential target. Use of anti-virus, anti-spyware, and firewall software is critical in protecting your computer online; however, simply protecting...
View ArticleSafe Online Shopping & Banking
Safe Online Shopping & BankingUse a Secure ComputerReseach the Company/WebsiteResearch the Product/ServiceUse Strong PasswordsMake Sure the Website Uses EncryptionUse a Secure Payment MethodMonitor...
View ArticleCloud Computing Best Practices
Cloud Computing Best Practices We've provided some general information below about cloud computing. At RIT, information handling requirements (including the use of non-RIT servers for storage) are...
View ArticleAwareness Posters and Videos
PostersIn the last EDUCAUSE Poster and Video contest, RIT student and Information Security Office employee Karyn Lewis won several monetary awards for her posters. We'll provide information on the 2013...
View ArticleUsing LinkedIn’s New Two-Factor Authentication
The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions. With passwords being easy to...
View ArticleBrowser Configuration
Browser ConfigurationOne of the easiest “technologies” to keep your information and computer safe is properly configuring the security settings on your web browser. Most people leave the settings at...
View ArticleOctober is Cyber Security Awareness Month!
October is Cyber Security Awareness Month! This year is the 11th anniversary of National Cyber Security Awareness Month, a collaborative effort created between government and industry to guarantee...
View ArticleNo-Click November
No-Click NovemberIt’s November again. Cyber Security Awareness month (October) just passed but that doesn’t mean that we don’t have to keep practicing all the online safety tips we learned; quite the...
View ArticleSafe Social Networking and Blogging
Social networks are great. They do present some security challenges and risks, however.This guide describes the dangers you face as a user of these websites, and provides tips on the safe use of social...
View ArticleOnline Safety
Online SafetyEveryone connected to the Internet is a potential target. Use of anti-virus and firewall software is critical in protecting your computer online; however, simply protecting your computer...
View ArticleHost Intrusion Prevention (RIT-owned/leased computers only)
Note:This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run host intrusion prevention.Currently, personal networking...
View Article