Best Practices

Wireless Networking

Wireless Networking

Wireless logo

Wireless networks are generally considered to be less secure than wired networks; however, with proper configuration and encryption enabled, they can provide more than adequate security for most users. Read our Accessing Wireless Networks Safely Brochure to learn more and better protect your privacy.

Wireless at RIT

RIT offers four different wireless networks across campus:

  • RIT - An encrypted WPA2 network and the preferred network for all devices. Devices using this network must be registered using RIT account credentials.
  • RIT-Guest - An open public network
  • ... ...

Identity Theft

Scams and malware are not the only way criminals can steal identities. There are many ways for identity thieves to victimize you, damage your credit, steal important documents or information.

Read our Avoiding Identity Theft Online brochure to learn how to spot basic online scams and how to protect yourself.

Although online scams and malware have reached epidemic proportions, they are not the only way criminals can steal identities. Discarded bank statements, receipts, bills, etc. are also great sources for identity thieves. The Federal Trade Commission's Identity Theft page provides more information on the... ...

Cloud Computing Best Practices

We've provided some general information below about cloud computing. At RIT, information handling requirements (including the use of non-RIT servers for storage) are articulated in the Information Access and Protection Standard. Refer to the standard for more information about storage restrictions based on information classification.

There are certainly some benefits to cloud computing, but the practice of saving content on the Internet is facing more scrutiny than ever. While there is no silver bullet solution to securing your cloud service, understanding how you can protect yourself is the best way to keep your information private.

Keep up to date... ...

Ransomware

Ransomware Screen

What is Ransomware?

Ransomware is a type of malicious software that encrypts your files. Often, the only way to decrypt and gain access to the files is by paying a “ransom” or fee to the attackers. The attackers might provide the decryption key allowing you to regain access to your files. Ransomware may spread to any network shares/drives to which you’re connected. We are continuing to see ransomware attacks and expect their frequency to increase.

How can I get infected with Ransomware?

Common vectors for Ransomware attacks include emails with malicious attachments... ...

Backing Up Your Data

Backing Up Your Data

What is a data backup?

Backing up data is the process of copying files and folders to a separate secure location for the purpose of restoring them in case of data loss. Losing data is harmful to both individuals and companies as it may result in months’ or years’ worth of work if the information is destroyed and otherwise unrecoverable. Within the last few years, data loss has become a huge issue because of the rise of ransomware, a dangerous malware capable of encrypting a user’s data so that the data cannot be recovered... ...