Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn about

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »


Smartwatches May Look Cool, But They Are Also Vulnerable

A fast growing market as of late is that of wearable technology. Smartwatches in particular have increased in popularity within the past year and this trend doesn’t seem to be slowing. And why would it when smartwatches are handy multi-functional devices that also look cool on your wrist? Smartwatches made by giants such as Apple and Google can send messages and use mobile apps while also acting as your personal fitness coach. All of this in a fashionable little watch with touchscreen capability.

However, the novelty that makes smartwatches so exciting is also what makes... ...

Social Media: A Growing Phishing Pond

Phishing Pie ChartIn the past, hacking social media accounts has been popular among cyber criminals for a variety of reasons including the opportunity to spread malware and spam. Hijacked accounts can also be sold for money to other cybercriminals for the stolen data they contain. However, phishing attacks on social media are becoming an increasingly prevalent activity due to the extensive number of users that can be reached. For a cybercriminal, more users means greater profits.

According to research by Kaspersky Lab, one in five phishing... ...

Watch Out For these Top Phishing Attacks

According to Get Cyber Safe, over 156 million phishing emails are sent every day. 10%  of people targeted take the bait and click on an embedded email link compromising their login credentials or installing onto their computer. To keep yourself savvy on the latest phishing trends, here are some of the top phishes targeting people:

phishing example  
Image from NerdGraph  

The “Account Suspended Phish”

This phishing attack appears to be an official mail from your bank, a large retail site you... ...

How Well Do You Understand Privacy Settings?

How often do you review the privacy settings on apps, social networks, or even search engines? If you’re like most Internet users, it’s probably not very frequently, but you should be if you’re at all concerned about your personal information being shared.

Social Networks

Did you know Facebook allows users to look up other users by their phone numbers? If not, you likely have this turned on in your privacy settings and weren’t even aware of it! Sites like Facebook, LinkedIn, and Twitter all have user-controlled privacy settings, meaning that you have the power to control who sees what you... ...

Tech Safety Tips for the Holidays

​43% of us will be hitting the road on long-distance trips for the upcoming holidays, according to the United States Department of Transportation. While getting ready to trek away from home don’t forget to keep security at the top of your checklist. Avoid some common, and potentially devastating, errors to help make the holidays go by just a little bit smoother. We’ve rounded up a list of some tips to keep one less thing off your mind during this busy time of year.

... ...
Holiday Travel