Quantcast
Channel: RIT Information Security - Best Practice
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Document Destruction

Document DestructionUpdated January 31, 2013Why Have Document Destruction Activities?Document Destruction Activities provide a focused opportunity for RIT faculty and staff to archive securely or...

View Article


Printer Best Practices

Printer Best PracticesPrinters often handle RIT Confidential information, but they can easily be overlooked when securing a network. Use the following best practices to secure any printers you...

View Article


Media Disposal Recommendations

Media Disposal RecommendationsMediaDisposal MethodPaperUse a shredder. Crosscut is preferred over a strip shredder.CD, DVD, diskette, etc.Use the media shredder (located at the ITS HelpDesk,...

View Article

Image may be NSFW.
Clik here to view.

Safe Social Networking and Blogging

Safe Social Networking and Blogging Social networks are great. They do present some security challenges and risks, however. This guide describes the dangers you face as a user of these websites, and...

View Article

E-mail at RIT

E-mail at RIT E-mail is a standard communication tool. Unfortunately, it is also an ideal channel for social engineering and phishing attempts; protect yourself and your information. Managing Your RIT...

View Article


Host Intrusion Prevention (RIT-owned/leased computers only)

Host Intrusion Prevention (RIT-owned/leased computers only) Note:This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run...

View Article

Security Assessment Tools

Security Assessment ToolsThe following tools should be used in combination to conduct security assessments.ToolDescriptionRapid 7 Nexpose (RIT Enterprise Licensed by ISO)Unified vulnerability...

View Article

Virtual Private Networks

Virtual Private NetworksA Virtual Private Network (VPN) is a technology that allows for secure transmissions across the Internet between two networks by using a secure "virtual tunnel." Without using...

View Article


Image may be NSFW.
Clik here to view.

Wireless Networking

Wireless Networking Wireless networks are generally considered to be less secure than wired networks; however, with proper configuration and encryption enabled, they can provide more than adequate...

View Article


Image may be NSFW.
Clik here to view.

Online Safety

Online Safety Everyone connected to the Internet is a potential target. Use of anti-virus, anti-spyware, and firewall software is critical in protecting your computer online; however, simply protecting...

View Article

Safe Online Shopping & Banking

Safe Online Shopping & BankingUse a Secure ComputerReseach the Company/WebsiteResearch the Product/ServiceUse Strong PasswordsMake Sure the Website Uses EncryptionUse a Secure Payment MethodMonitor...

View Article

Cloud Computing Best Practices

Cloud Computing Best Practices We've provided some general information below about cloud computing. At RIT, information handling requirements (including the use of non-RIT servers for storage) are...

View Article

Image may be NSFW.
Clik here to view.

Awareness Posters and Videos

PostersIn the last EDUCAUSE Poster and Video contest, RIT student and Information Security Office employee Karyn Lewis won several monetary awards for her posters. We'll provide information on the 2013...

View Article


Using LinkedIn’s New Two-Factor Authentication

The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions. With passwords being easy to...

View Article

Image may be NSFW.
Clik here to view.

Browser Configuration

Browser ConfigurationOne of the easiest “technologies” to keep your information and computer safe is properly configuring the security settings on your web browser.  Most people leave the settings at...

View Article


Image may be NSFW.
Clik here to view.

October is Cyber Security Awareness Month!

October is Cyber Security Awareness Month!  This year is the 11th anniversary of National Cyber Security Awareness Month, a collaborative effort created between government and industry to guarantee...

View Article

No-Click November

No-Click NovemberIt’s November again. Cyber Security Awareness month (October) just passed but that doesn’t mean that we don’t have to keep practicing all the online safety tips we learned; quite the...

View Article


Image may be NSFW.
Clik here to view.

Safe Social Networking and Blogging

Social networks are great. They do present some security challenges and risks, however.This guide describes the dangers you face as a user of these websites, and provides tips on the safe use of social...

View Article

Image may be NSFW.
Clik here to view.

Online Safety

Online SafetyEveryone connected to the Internet is a potential target. Use of anti-virus and firewall software is critical in protecting your computer online; however, simply protecting your computer...

View Article

Host Intrusion Prevention (RIT-owned/leased computers only)

Note:This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run host intrusion prevention.Currently, personal networking...

View Article
Browsing all 25 articles
Browse latest View live