Information Security: ITS Organization – Information Technology Services

Cristopher Centers

INFORMATION SECURITY Information Technology Services Security provides strategic planning and framework to support a safe and secure University IT environment by developing security policies, procedures, and standards. Information Security also provides research and recommendations for security solutions for Students, Faculty and Staff.  If you have a questionable email, report it to […]

INFORMATION SECURITY

Information Technology Services Security provides strategic planning and framework
to support a safe and secure University IT environment by developing security policies,
procedures, and standards. Information Security also provides research and recommendations
for security solutions for Students, Faculty and Staff. 

If you have a questionable email, report it to [email protected]

For the most current phishing scams to avoid, go to the ITS Phish Tank.

JOB SCAM ALERT! from CCPD

Important Covid related links for review:

https://www.ftc.gov/coronavirus/scams-consumer-advice
https://www.fbi.gov/coronavirus
https://www.fbi.gov/news/stories/protect-yourself-from-covid-19-scams-040620

COVID-19 Resource Links

COVID-19 Security Resource Library
A compilation of tips and recommendations from NCSA (National Cyber Security Alliance)
and its partners on ways to stay safe online, as well as how to avoid cyber threats
and scams during this pandemic.

Educause: Transitioning to Remote Work – As colleges and universities transition to online courses and remote work because
of COVID-19, the author shares some lessons and tips for working virtually.

Questions about the Know Be4 required training? Click here.

STOP.THINK.CONNECT. Lock Down YOUR Login.
6 STEPS to BETTER SECURITY: 1. Protect your accounts with strong authentication. 2. Keep software updated. 3. Avoid Phishing Attempts 4. Use UNIQUE passwords (or better yet, a password manager). 5. Protect mobile devices. 6. Use trusted security tools. 

Firewall
Firewalls represent one component of a strategy to combat malicious activities and
assaults on computing resources and network-accessible information. 
(More…)

Phishing 
WHAT IS PHISHING? | PHISHING EXAMPLES | ITS PHISH TANK (latest Bing directed phishing scams) | Coronavirus hoaxes

Phishing is the act of sending an email message in an attempt to obtain private, sensitive
information such as passwords or financial information by claiming to be a legitimate,
trustworthy enterprise. There have been several phishing scams that have appeared
to come from legitimate campus sources. You should be aware of what phishing is and
what to do about it. (More…) 

Don't Take the Bait for Phishing Scams

Phishing Examples
Not sure what phishing might look like? Click here to view Phishing Examples. If you receive a questionable email, report it to [email protected] or contact the Help Desk.

Data Security
Data security threats can take many forms; however, developing good practices can
minimize your exposure and make intrusion more difficult. (More…)

Two-Step Verification

Set up 2-Step Verification by clicking on the Binghamton University logo in the upper
right corner of the BMail web page and select the Google Account button. On the account
page, select the Security menu from the left and select 2-Step Verification to get
started with the process…

Two-step verification is a process that involves two authentication methods performed one after the other
to verify that someone or something requesting access is who or what they are declared
to be. For information on Two-Step Verification and Two-Step Authentication, visit this page.

VPN
Pulse Secure can be installed by logging into https://ssl.binghamton.edu and clicking on the appropriate bookmark to download and install the desired version
of Pulse Secure for your operating system (Windows 32 or 64 bit, Mac OS or Linux).
The Pulse Secure ReadMe file contains installation and configuration instructions.
Once it is installed, Pulse Secure will be listed in your programs and as a shortcut
in the Windows System Tray or Mac Menu Bar. You do not need to access the SSL VPN
web page each time you want to connect via VPN.

Malware
Malware is a term which is short for malicious software. It is software which is designed
to infiltrate your computer, often to steal sensitive information or to send spam.
Malware includes things such as tracking software, keyloggers, “bots,” rootkits, viruses,
trojan horses, worms, etc. More information is available in the Malware FAQ.

Ransomware
Ransomware is a term that describes malicious software that attacks a computer and
requires payment of a “ransom” to remove the harmful effects of the software.

Spread through email attachments, links in Twitter or Facebook posts and through infected
websites (often porn sites) this ransomware has been seen targeting companies through
phishing attacks.

If you think your computer is infected or have questions, contact the ITS Help Desk
at 607-777-6420 or email [email protected] (More…)

Virus Protection
New computer viruses are appearing all the time so it’s important to keep your anti-virus
software up-to-date. Computing Services provides the latest versions of anti-virus
software on the web to the Binghamton University community for both the Windows and
Macintosh platforms. Click here for Anti-Virus protection.

Protect Your Strong Passwords | Password Best Practices
Why Protect Your Passwords? In modern times, it seems as though the Internet of Things is more rapidly beginning to dictate our lives. This means that the more secure you
keep your information, the less likely you are to be negatively affected by this change.
This is where things like password managers become extremely useful.

In the world of the highly powerful and sometimes highly dangerous World Wide Web,
you may be skeptical of the efficacy of such applications. Why would I trust anyone
with all of my passwords when I can secure them myself? The problem is, we already
do this with each web based application we use on a daily basis. Typing a password
into Google is the same as saying “You can have access to my personal information
as long as you keep it safe.” In fact, in February 2016, over 1 million Gmail accounts
were targeted by government backed hackers looking to steal your personal information.
Being skeptical of password thieves may seem like a safe bet, but sometimes we don’t
even know where those thieves may appear.

The other problem with human crafted passwords is that we are naturally lazy. We prefer
ease of entry over security and safety. All of these factors make it very easy for
attackers to claim access to our accounts which may not seem like a problem until
you realize how much information you really have in the Internet of Things. MORE…

Top 10 Security Tips – FOR COMPLETE LIST, VISIT: https://www.binghamton.edu/its/about/organization/security/phishing.html

  1. Back up your data!
  2. Create and remember strong passwords.
  3. Do not download from unknown sources.
  4. Do not reply to emails requesting login or bank account information.
  5. Install anti-virus software.
  6. Regularly update your operating system and software applications.
  7. Remove malware, spyware and viruses.
  8. Control access to your computer.
  9. Protect sensitive data.
  10. Stay informed – follow us on social.

Helpful links:
SANS Institute Security Tip of the day

Follow us Instagram and Twitter for tips on security and information technology.

Its Presentation-Tech Ready-Orientation

Next Post

Pandemic accelerated the adoption and sophistication of IoT technology

The enterprise is finding its digital capabilities have been put to the test amid the coronavirus crisis, and a new report from Vodafone Business shows IoT’s significant impact. Image: iStock When it became apparent to Americans that our only recourse in dealing with COVID-19 was to isolate, as well as […]