Information Security – Provides the ongoing services to help protect FIT from cyber attacks and respond to attacks in progress. Cyber attacks are constantly morphing and improving. The focus of this function is to protect against known methods of cyber-attack (e.g., phishing, social engineering, advanced persistent threat, blunt force) while also working with SUNY and other organizations to be prepared for future attack methods. Examples of services include information security policy, incident response, information security awareness training, network security architecture and monitoring, application security architecture and monitoring.
Below you will find tips and techniques to increase your cybersecurity. For information on the latest threats to the FIT community, please view our Cybersafe page.
Have you ever wondered if your account information or password has ever been exposed in a data breach? Have I Been PWNED? (HIBP) is a free resource developed by a Microsoft researcher for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or […]
The use of extortion by cyber criminals has been increasing recently. Cyber extortion is when cyber criminals demand payment to stop some form of malicious activity against the victim, such as the release of data. In an increasingly common form of cyber extortion, the victim receives an email saying that their information will be […]
Log into your Google Account Go to the My Account Page (https://myaccount.google.com/) Click on Device Activity and Notification Under recently used devices click Review Devices From the list find the lost or stolen phone or device and click “remove”
You can help protect a sensitive or confidential document from unwanted edits by assigning a password. You can also prevent a document from being opened. Follow the instructions in the video below or you may follow the links below to review the instructions available from Microsoft. Password Protect an Excel File Password Protect a Word […]
Are you printing a confidential document? You don’t need to sprint to the office printer to keep others from seeing the information, you can hold the print job and walk over without fear. The video below provides instructions on how to hold a print job on a Windows computer.
Many of us store so much of our information on our mobile devices from photos to phone numbers (do you know your best friends number by heart?) that we feel uneasy when we don’t have it. That feeling can be amplified if our phone is lost or stolen. Best practices to be Cybersafe is to […]
29% of people do not use PINs or passcodes on their mobile devices. (Source: CTIA 2016) If you lost or left your phone unattended would you want someone scrolling through your emails, photos, and chats? Of course, not and enabling password protection is easy you can enter a customized PIN, or many phones now offer face […]
Your FIT issued computer may provide access to confidential student and employee information and your personal information as well. To increase cyber security and protect personal and campus information resources from theft, malicious destruction, alterations or other inappropriate or negligent acts, we strongly encourage staff and faculty to lock their unshared FIT issued computer manually when leaving […]
What is Ransomware? Ransomware is computer malware that encrypts the files on your PC, making them (and often your whole computer) unusable. It may also encrypt files on network drives that you have access to, like your N: drive. You regain access to the files by paying a ransom to receive a decryption key. In […]