The ability to work remotely can help keep the university’s operations running from afar. Though potentially of great benefit to your department's operations, it's essential that all remote work be performed in a secure computing environment.
Logging in and Accessing Your Files Remotely
Using an RIT-provided laptop is the best option for working remotely. However if you don’t have an RIT laptop and need to use your personal computer, we have included some guidelines below.
Yes, you can use RDP (Remote Desktop). Approval is needed from your manager/supervisor. Please forward their approval to the ITS Service Desk (help.rit.edu) to get the process started or contact the ITS Service Desk first and include the name of your manager/supervisor and we will reach out to them. We will also need the full hostname of the PC you are connecting to, and the PC you are connecting from.
*Do not use a computer system that is no longer supported to conduct RIT business (for example, Windows 7). If you are unable to follow the requirements of the security standard, you must have an approved exception request from the RIT Information Security Office. That request requires signoff by a Dean or VP.
Yes, many RIT resources require use of Duo MFA to log in to those resources. Ensure that Duo is configured so that you can use it from home. You must be able to either receive a push, phone call, or use a passcode. For issues with Duo, please contact the ITS Service Desk, help.rit.edu or (585) 475-4357.
It is advised to provide your contacts with alternate methods in which to communicate with you. Incoming calls to campus telephones can be forwarded to a personal mobile phone or home phone, but call forwarding must be configured while you still have physical access to your campus telephone. There is an associated chargeback of $5 a month and a one-time cost of $22.50. You must contact the ITS Service Desk to request this. It is advised to provide your contacts with alternate methods in which to communicate with you. Another option is to make calls via Zoom with your RIT account.
RIT Information Security Provides best practices for using smartphones and other mobile devices securely. You should protect your smartphone similarly to how you would protect any other portable computer. In addition to using a PIN or other physical protection to control access to the device, one of the most important actions to take is keeping your smartphone up to date, including the operating system and applications.
You MAY NOT place RIT Private or Confidential data in cloud services such as DropBox that do not have RIT authentication, without an approved exception request. Private information must be encrypted. We recommend encryption for confidential information
If placing private information on portable media (please don’t), it must be encrypted
Ensure that your RIT or personal computer is password protected when you’re not using it. You do not want a family member inadvertently deleting or changing information. RIT-owned computers should be configured to screen lock automatically. If you are using your own computer, please enable the password-protected screen saver. Information about the software and instruction necessary to comply with the Desktop and Portable Computer Standard is available.
Yes. Be vigilant. Attackers always take advantage of chaos to launch phishing and social engineering attacks. Be especially alert for phishing attacks masquerading as communications around COVID-19. Expect Business Email Compromise (BEC) attempts where attackers try to masquerade as RIT leaders. Phishing and BEC attempts are not limited to email. They may come through phone calls or messaging.
Report Business Email Compromise attempts to the ITS Service Desk.