The Division of Information Technology protects our campus networks by preventing access to specific websites. We do this to guard against illegal and malicious activity on the FIT networks.
Your FIT ID number, sometimes called @number is a unique identification number assigned to an individual at FIT. FIT ID numbers consist of the at-sign (@) followed by eight digits. Example @01234567. To view your FIT ID number log in to MyFIT. Click on the triangle next to your name on the right-hand side of the […]
Please be advised that some devices may not work on the FIT network. Many of the devices not compatible with the FIT network were designed to work in home network environments, and therefore do not fully function on a campus network environment. Many universities are experiencing the same issue with these devices. Specifically, only devices that support the […]
Computer Recommendations We suggest students buy a Mac or Windows computer based on the requirements of their major and personal preferences. Please contact your major department for information about major requirements. The Division of Information Technology recommends all computers have the following minimum requirements when you buy a computer: At least 8G of RAM (*students using Creative Suite […]
Your username and default password will be provided to you by one of the following departments; please note the Division of Information Technology does not send this information. Degree ApplicantsThe Office of Admissions will send your FIT username and FIT default password; after you complete the SUNY Application Online. It may take 7-10 days to […]
The new portal also has additional security features to help keep your personal information safe, but there are some Cybersafe habits you should continue to practice. Sign out of all applications including MyFIT. Quit the browser, do not just close the tab. Log off the computer when you are finished. On occasion, you may encounter a “500 Error […]
What is Ransomware?Ransomware is computer malware that encrypts the files on your PC, making them (and often your whole computer) unusable. It may also encrypt files on network drives that you have access to, like your N: drive. You regain access to the files by paying a ransom to receive a decryption key. In 2016, […]