Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn about
Phishing

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »

 
 

Avoid Questionable Mobile Apps

Questionable Mobile Apps

It is important to make sure a mobile app is reliable before downloading it. Detecting malicious apps is not always easy, but here are a few steps you should take before downloading an app.

Android users have the highest risk of downloading malicious apps. Researchers at Kaspersky found over 200,000 samples of mobile malware at the Google Play store and additional sources, in 2013. The malicious malware is often used as a multiplier, sending text messages containing malicious links to the contacts saved on the phone, or stealing other personal informational directly from the infected phone. 

When... ...

RIT Information Security Alert: Your RIT account information Phish

Many RIT faculty, staff, and students have received an email informing recipients that there’s been a database update and they must follow the link and update their account information. The link leads to a spoofed copy of the RIT login page. A copy of the phish is provided below.

 

Sample Phishing Email

From: Rochester Institute of Technology <Sender email address>
Date: Thu, Mar 2, 2017 at 6:01 PM
Subject: Your RIT account information
To: recipient email address

Hello,

Due to a recent update in our database, its is important that you update you account information. Please... ...

Welcome to Information Security

The website is organized into the following areas:

 

Section Content

Requirements/ Standards

What Faculty, staff, students, and others associated with RIT MUST do to comply with the Information Security Policy and Standards. Information about our standards process and exception process. Proposed standards available for comment.

Job & Employment Scams

We all use the internet to find jobs. However, not all jobs listed are legitimate, even on job boards. (Many job boards allow employers to post jobs directly and administrators of job sites may not catch scam postings immediately.) Does the job sound too good to be true? It may be a scam. These scams can result in identity theft, loss of money, and more.

So, how do you know when you have found a scam? Here are some things to look for, adapted from symplicity™:

Fraud Posting Red Flags

What are the red flags in job postings? Symplicity has... ...

Protecting Mobile Devices

Protecting Mobile Devices

 

With the growth in smartphone usage around the world, issues surrounding mobile security have grown as well. It is more important than ever to arm your mobile devices with protective software. The largest target for attacks on mobile devices is Google's Android operating system, due to the rapid expansion and market penetration of Android smartphones.

Some top rated mobile security software for 2019 includes:

  • Avast
  • ... ...