Profile

Cover photo
RIT Information Security
200 followers|40,701 views
AboutPostsPhotosVideos

Stream

 
Try to always keep the operating system and all installed "Apps" up to date on your mobile device to help prevent an attack that could compromise it. #MobileDeviceMadness
1
Add a comment...
 
Make sure you know your mobile vendor’s policies on lost or stolen devices and if it gets lost contact the carrier ASAP and ask them to deactivate the device. #MobileDeviceMadness
1
Add a comment...
 
You can keep updated with information about known phishing attacks and report them at http://www.apwg.org/ #PhebruaryPhishing
1
Add a comment...
 
Another good way to protect yourself from phishing is trying to familiarize with commercial websites’ privacy policies, which are usually at the foot of the page. One of the most useful ones to look for is whether it will sell its mailing list or not. #PhebruaryPhishing
1
Add a comment...
Have them in circles
200 people
Benjamin Bliss's profile photo
Olivia Weber's profile photo
Javier Santana's profile photo
Anand Ashok Khare's profile photo
Tallon Rood's profile photo
Jeremy Schiefer's profile photo
Megan Cooper's profile photo
Curtis Oldfather's profile photo
Advent IM Holistic Security Consultants's profile photo
 
A way to keep your mobile devices more protected is configuring its secure settings such as auto-lock, password protection, etc. Ensure that browser security settings are correctly configured. #MobileDeviceMadness
1
Add a comment...
 
March is #MobileDeviceMadness month! Mobiles are not always well-secured devices and they are more easily stolen or compromised than computers, this is why we must take precautions when using them to store or access private or confidential info. Keep up with us for tips on how to stay protected.
1
Add a comment...
 
#PhebruaryPhishing is over. Test how much you learned about phishing this month and what you still need to know: http://goo.gl/8mxocj
1
Add a comment...
 
Don’t submit private information via forms embedded within email messages. Senders will most likely be able to track it. #PhebruaryPhishing
1
Add a comment...
 
Another characteristic of phishing emails is that they are normally not personalized, often beginning with things like “Dear sir”, while legit emails from banks and other institution normally mention an account you have or something about you. #PhebruaryPhishing
1
Add a comment...
 
Cybercriminals frequently threat that your security has been compromised including things like “your account will be closed if you don’t to this email message” in phishing scams. Watch out for these signs. #PhebruaryPhishing
1
Add a comment...
People
Have them in circles
200 people
Benjamin Bliss's profile photo
Olivia Weber's profile photo
Javier Santana's profile photo
Anand Ashok Khare's profile photo
Tallon Rood's profile photo
Jeremy Schiefer's profile photo
Megan Cooper's profile photo
Curtis Oldfather's profile photo
Advent IM Holistic Security Consultants's profile photo
Contact Information
Contact info
Phone
(585) 475-4122, (585) 475-4123
Email
Fax
Fax: (585) 475-7920
Address
151 Lomb Memorial Drive Ross 10-A201 Rochester Institute of Technology Rochester, NY 14623-5608
Story
Tagline
Keep the RIT community secure from Internet and other threats.
Introduction
Rochester Institute of Technology Information Security is here to help keep the RIT community safe and secure from Internet and other threats to your information security.

Mission
Provide leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT information and computing assets.

Description
The Information Security Office provides strategy definition, risk assessment, standards development, communication & training, and investigation of threats & incidents.