Keeping Safe

Keeping Safe: Guidelines and Best Practices

Not sure how to keep yourself, your information, and your devices safe? Click on the headings below for best practices, resources, and more; also be sure to check out our blog for more specific content, answers to your information security questions, and best practices guides!

... ...

Subject Area


Securing your Computer

Free downloads and instructions to support the Desktop and Portable Computer Standard.

Mobile Devices

Learn how to safely use

Identity Theft

Scams and malware are not the only way criminals can steal identities. There are many ways for identity thieves to victimize you, damage your credit, steal important documents or information.

Read our Avoiding Identity Theft Online brochure to learn how to spot basic online scams and how to protect yourself.

Although online scams and malware have reached epidemic proportions, they are not the only way criminals can steal identities. Discarded bank statements, receipts, bills, etc. are also great sources for identity thieves. The Federal Trade Commission's Identity Theft page provides more information on the different methods... ...

Security Education, Training, & Awareness

Security Education, Training, & Awareness

Information security is a complex and constantly changing field that individuals at every level of the organization need to keep pace with in order to keep RIT information resources secure.  RIT offers the following education training and awareness programs to assist everyone from end user to system administrators to keep current with information security trends.

Academic Education

  • The GCCIS NSSA department provides a variety of information security courses at the graduate and undergraduate level.


  • Orientation sessions: The ISO provides introductory information security training and materials at new student and new employee orientations. Check
  • ... ...