Profile

Cover photo
RIT Information Security
287 followers|35,388 views
AboutPostsPhotosVideos

Stream

 
Want tips on protecting yourself and everyone else? Make sure you're following us on social media #infosec
https://www.rit.edu/security/content/social-media
Social Media. RIT Information Security maintains a presence on the following networks. Follow us for the latest updates and alerts! Facebook · Twitter · Google+ · Instagram · Pinterest. Content Curation. Want to see what others are saying about Information Security?
1
Add a comment...
The biggest payout from United Airlines for his 20+ bugs was a 250,000 mile reward for an undisclosed flaw.
1
Add a comment...
 
Social experiment conducted on University of Illinois campus reveals dangers of USBs #infosec https://blog.kaspersky.com/dangerous-usb/12736/
Should you plug in a USB stick that you found into your computer? No, just no.
1
Add a comment...
 
Welcome class of 2020! Check out the RIT Information Security website #infosec

https://www.rit.edu/security/welcome
Section, Content. Requirements/ Standards. What Faculty, staff, students, and others associated with RIT MUST do to comply with the Information Security Policy and Standards. Information about our standards process and exception process. Proposed standards available for comment. Keeping Safe/
1
Add a comment...
 
It only takes a few minutes. Set up two-factor authentication today #infosec
https://heimdalsecurity.com/blog/start-using-two-factor-authentication/
Everything you need to know about two-factor authentication: What it is, why you should activate it and how to make it work for you.
1
Add a comment...
Have them in circles
287 people
Bilal ZIANE's profile photo
Courtney Smith's profile photo
Will Getty's profile photo
Computer and Internet Security's profile photo
JeanMarie Mangione's profile photo
Fahad “Ali” M's profile photo
Jessica Daniel's profile photo
Johanna Calderon's profile photo
Monique Allin's profile photo
Epic games has owned up to two data breaches from its online forums. One of them involves password-related data. We investigate…
1
Add a comment...
 
Students, do you know what your responsibilites are when it comes to information security? #infosec
https://www.rit.edu/security/content/requirements-students
Desktop and Portable Computer Standard. Always. Password Standard. Always. Signature Standard. Always - All authentic RIT communications should include an appropriate signature as per the standard. Make it a habit to check for an authentic signature when receiving messages from RIT.
1
Add a comment...
 
Welcome back to RIT! Make sure your email is set up for success #infosec
https://www.rit.edu/security/content/e-mail-rit
E-mail at RIT. Submitted by ISO Admin on Fri, 12/09/2011 - 14:41. E-mail is a standard communication tool. Unfortunately, it is also an ideal channel for social engineering and phishing attempts; protect yourself and your information.
1
Add a comment...
Charlie Miller and Chris Valasek learned to hack car’s steering wheel, brakes and acceleration and presented their finding at Black Hat USA 2016.
1
Add a comment...
People
Have them in circles
287 people
Bilal ZIANE's profile photo
Courtney Smith's profile photo
Will Getty's profile photo
Computer and Internet Security's profile photo
JeanMarie Mangione's profile photo
Fahad “Ali” M's profile photo
Jessica Daniel's profile photo
Johanna Calderon's profile photo
Monique Allin's profile photo
Contact Information
Contact info
Phone
(585) 475-4122, (585) 475-4123
Email
Fax
Fax: (585) 475-7920
Address
151 Lomb Memorial Drive Ross 10-A201 Rochester Institute of Technology Rochester, NY 14623-5608
Story
Tagline
Keep the RIT community secure from Internet and other threats.
Introduction
Rochester Institute of Technology Information Security is here to help keep the RIT community safe and secure from Internet and other threats to your information security.

Mission
Provide leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT information and computing assets.

Description
The Information Security Office provides strategy definition, risk assessment, standards development, communication & training, and investigation of threats & incidents.