Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn more
InfoSec About Us Lock + Cable
Sentinel - Standards and Policies
,
Learn about
Phishing

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »

 
 

Secure Your Data and Information

For the second week of spring cleaning, make sure your information is as secure as it can be. This means updating passwords, backing up your data, and further protecting your private information from identity thieves and cyber criminals. Take these steps to enhance the security of your devices and your online accounts:

Password Protect Every Device

Make sure all your devices have at least a password or passcode. This is the first line of defense if your device is ever stolen. All of your computers and devices should have a unique, strong password. If you can’t remember all of your... ...

Clean and Update Your Devices

Spring is (sort of) here! And that means it’s time to do some digital spring cleaning. Is your computer running slow? Is your smartphone experiencing glitches? Now is a great time to test the security of your devices and make sure all systems are clean. You should take this month to catch up on system updates and make sure you are using the latest version of all software programs and applications. You know computers can pick up bugs and viruses, but they can also become bogged down by miscellaneous programs and applications that you may not even be using. Below are some... ...

Cyberattack on RIT Continues

The cyberattack on RIT and our users (you) by cybercriminals continues. The attack vectors and file names and types are changing rapidly. We’ll provide more information below on what we know so far, but we need you to do the following:

  • If you receive an email with an unexpected attachment or link, verify with the sender BEFORE opening the attachment or clicking on the link. Your colleague’s account may be compromised. The malicious email may come from them.
  • If you notice that you're receiving many undeliverable messages/bouncebacks in your email, change your password and contact your service desk.
  • Please submit suspected phishing/spam by creating a
  • ... ...

Cyberattack on RIT—RIT Information Security Alert

Cyberattack on RIT

We’re not trying to sound overly dramatic, but we need you to read this alert and take action (and tell your colleagues and fellow students).

RIT and our users (you) are currently under attack by cybercriminals. We’ll provide more information below, but we need you to do the following:

  • If you receive an email with an unexpected attachment or link, verify with the sender BEFORE opening the attachment or clicking on the link. Your colleague’s account may be compromised. The malicious email may come from them.
  • Please submit suspected phishing/spam by creating a new mail note to spam@rit.edu and attaching the suspicious
  • ... ...

Tips and Tricks for Keeping Your Smartphone Secure

A smartphone today is more than just a phone. A smartphone is a miniature computer used for a wide range of tasks that weren’t possible even a decade ago. Yet despite this drastic increase in smartphone features and functionality, consumer misconceptions about the need for mobile security still exist.

According to research from Norton by Symantec, people may be thinking about their texts, voice messages, pictures and videos when it comes to their smartphones, but maybe not so much their financial and home security apps. This mindset leaves users vulnerable to very real threats.

Adopting these simple tips can... ...