Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn more
InfoSec About Us Lock + Cable
Sentinel - Standards and Policies
Learn about

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »


Job & Employment Scams

We all use the internet to find jobs. However, not all jobs listed are legitimate, even on job boards. (Many job boards allow employers to post jobs directly and administrators of job sites may not catch scam postings immediately.) Does the job sound too good to be true? It may be a scam. These scams can result in identity theft, loss of money, and more.

So, how do you know when you have found a scam? Here are some things to look for, adapted from symplicity™:

Fraud Posting Red Flags

What are fraud posting red flags? Thanks to the many... ...

Protective Mobile Device Software

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

It is more important than ever to arm mobile devices with protective software.  PCs have been the target of malware and virus attacks for years, but recently mobile devices are being targeted more frequently.  Cyber criminals are most often creating malicious programs to gain access to financial information.

The major target for these attacks is Google’s Android operating system due to the rapid expansion and... ...

Better Passwords for Optimal Mobile Security

Smartphones open a back door into your life.  In the event that a hacker tries to remotely steal your information or your mobile device is lost or stolen, the first step of defense is locking it with secure passwords.  No matter the device you are using, there are improved guidelines to follow in order to keep your data safe.

A common mistake is using passwords like 123456 and password. These, and others like them, are easily cracked by hackers.  A key tip is to always remember that the longer the password, the better

An effective method of creating a... ...

RIT Information Security Advisory: Possible Password Exposure from Cloudflare Memory Leak

Cloudflare, a web services and security company, has announced a massive memory leak that may have exposed user data for thousands of sites. If you have an account on an affected web site, your password may have been exposed.

What should I do to protect myself?

  • If you are using your RIT password at any non-RIT site, change your RIT password immediately.
  • DO NOT use your RIT password for non-RIT sites


Additional recommendations

  • Change your password at other sites affected by the Cloudflare memory leak. High visibility affected sites by the Cloudflare memory leak include yelp.com, glassdoor.com,
  • ... ...

RIT Information Security Alert: Unusual Activity in your Webmail

RIT faculty and staff received an e-mail Friday afternoon claiming activity in your webmail. The email claimed that RIT had detected something unusual about your account and provides a Review button. A copy of the phish is provided below.

Sample Phishing Email

From: RIT webmail [mailto:lauram615@optimum.net]

Sent: Friday, February 24, 2017 3:33 OM

Subject: Unusual Activity in your Webmail

Dear User, 

We detected something unusual about your account. To help keep you safe, we require an extra security update.

As part of our Security Agreement we have place your email on "Limitation"

Review Here >

*to learn how... ...