Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn about

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »


Tips and Tricks for Keeping Your Smartphone Secure

A smartphone today is more than just a phone. A smartphone is a miniature computer used for a wide range of tasks that weren’t possible even a decade ago. Yet despite this drastic increase in smartphone features and functionality, consumer misconceptions about the need for mobile security still exist.

According to research from Norton by Symantec, people may be thinking about their texts, voice messages, pictures and videos when it comes to their smartphones, but maybe not so much their financial and home security apps. This mindset leaves users vulnerable to very real threats.

Adopting these simple tips can... ...

Keep Your Mobile Devices Safe on Spring Break

Spring break is just around the corner and many people will be taking to the sky, the roads, and the tracks. Whether you’re going on vacation or simply travelling back home, there are some important things to remember in order to keep your laptop, smartphone, and other mobile devices safe.

Before You Go

Back up your device 

If you are going on an extended trip, it’s a good idea to back up your data and photos before you leave. In the event of an incident, you will still have a recent version of your data.... ...

The Growth of Mobile Malware

Since the advent of the internet, cybercrime has been a problem. As we progress to a wider range of digital devices, more opportunities for cyber criminals present themselves. Malicious mobile programs have increased threefold in the past year according to research by Kaspersky Lab. The main purpose of mobile malware is to steal money from its victims. This can be achieved through banking Trojans, ransomware, SMS Trojans, and malicious apps in app stores.


Banking Trojans can impersonate the interface of your banking application in order to steal your banking credentials. Meanwhile, SMS Trojans can infect your device and... ...

Banking Trojans Are A Major Threat To Mobile Security

A banking Trojan is a type of malware whose purpose is to steal your banking information. These Trojans can get onto your device by mimicking something innocuous such as an important update or a bonus level for your favorite game. According to Kaspersky Lab, banking Trojans constitute over 95% of mobile malware, with Android devices being the most at risk.   

Acecard Android banking trojan development timelineOne of the newest and most dangerous Trojan threats is known as Acecard. This malware creates a convincing mobile banking application that overlays your... ...

Spear Phishers Exploit Trust

Spear phishing is a more targeted version of phishing, but the goal is the same. Cyber criminals want your money and your private information. With spear phishing, they may even attempt to use the company or organization you work for to dupe you into wiring money or giving out confidential information. Using information that can be found online, including your social media profiles, attackers can create personalized emails impersonating people you trust. A spear phishing attempt can be very convincing especially when it seems to be from a trusted contact such as your boss.

Examples of Spear Phishing

Fraudsters... ...