I recently sat down and talked with Ben Woelk, Policy Analyst in RIT Office of Information Security to discuss the functions of the office, how RIT protects the community, and what as end users can do to be safe online.
The first item we discussed is the role of Information Security at RIT. The university has developed a risk management approach to information security and as such the office is constantly assessing and evaluating the integrity and security of RIT networks. One of their more prominent efforts is the Private Information Management Initiative (PIMI) which involves the Office of Information Security helping RIT employees find and remove personally identifiable information (PII) on digital and non-digital mediums with the goal of reducing the amount of PII across the university.
During our conversation we also discussed what services Info Sec provides. The office has published several standards and procedures on their website and also works to educate everyone who uses RIT networks from Systems Administrators to End Users. Ben has also taught some sections of a Digital Self-Defense class for RIT students. There are some excellent resources for the full spectrum of users on the Information Security website and I highly recommend taking a few minutes to review them. They are very useful for anyone, not just those in the RIT community. Brochures include "How to create a strong password" and "Safer Social Networking."
As an Information Security and Forensics student I was very excited to learn more about what the office does. My biggest take-away from the discussion was something that wasn't at all new to me but which was further confirmed by talking with Ben: networks are only as strong as their weakest link. Often times that weakest link is the network's users. The office does a great deal to make those weaker links stronger but as a user you need to do your part too. Make use of the educational materials not just to help keep RIT networks secure but to keep you safe and secure online as well.
To learn more and utilize the great resources made by Information Security, visit their website and be sure to follow them on Twitter and "Like" them on Facebook to receive updates.
Be sure to follow me on Twitter to stay current.
- Tags: @phryanjr