Welcome to
Information Security

The Information Security Office provides leadership to the RIT community in safeguarding the confidentiality, integrity and availability of RIT’s  information resources.

Learn more »

Are you the
Weakest Link

Get information on how to safely remove private information from your devices and stay protected. The chain of security is in your hands.

Learn more »

Guard your
Private Information

The Private Information Management Initiative (PIMI) seeks to identify and reduce the amount of private information found on RIT computers and storage devices.

Learn More »

Learn more
InfoSec About Us Lock + Cable
Sentinel - Standards and Policies
Learn about

The ongoing evolution of digital communication also brings about the evolution of scammers and their methods. Phishing is one kind of such fraud, in which the attacker masquerades as a reputable individual or group, in order to trick users into revealing their private information. Check out our resources to learn how not be baited and reeled in!

Learn more »


How to Create Strong Passwords

As you have probably heard, using strong passwords is important. This is because strong passwords can protect you from some very serious incidents such as having your online reputation hacked, your money taken, and/or your identity stolen. If you are unsure what constitutes a strong password, please refer to the RIT Password Standard. Below are some additional strategies to help you create a strong password that is easy to remember.

General Method

  • No one agrees on an exact minimum password length, but generally between 10 and 14 characters is a good length. Anything longer is even better, but it
  • ... ...

Clean Up Your Online Presence

While you are outside enjoying the weather, potential employers may be searching for you online. Now is the perfect time to Google yourself and clean up your online reputation until it shines. It is also important to review your privacy settings to be sure that your personal information is only being shared with the world in the way you want. Below are some helpful tips for cleaning up your online presence as well as organizing your online life for a secure online presence.

Go Through Online Photos

If you have photos or photo albums online, now is the time to... ...

Digital File and Hardware Removal

As spring cleaning continues, consider sweeping through your files to determine which ones you need to keep and which you can get rid of. This is a good opportunity to clear up space on your devices and declutter your digital work environment. Also, if you have used cellphones or outdated computer equipment lying around, make sure you know how to safely dispose of them.

Delete or Archive Old Files

Empty your trash or recycle bin on all devices to permanently delete old files. On mobile devices, you can manually delete old text messages, pictures, videos, and any other file taking up unnecessary space.... ...

Secure Your Data and Information

For the second week of spring cleaning, make sure your information is as secure as it can be. This means updating passwords, backing up your data, and further protecting your private information from identity thieves and cyber criminals. Take these steps to enhance the security of your devices and your online accounts:

Password Protect Every Device

Make sure all your devices have at least a password or passcode. This is the first line of defense if your device is ever stolen. All of your computers and devices should have a unique, strong password. If you can’t remember all of your... ...

Clean and Update Your Devices

Spring is (sort of) here! And that means it’s time to do some digital spring cleaning. Is your computer running slow? Is your smartphone experiencing glitches? Now is a great time to test the security of your devices and make sure all systems are clean. You should take this month to catch up on system updates and make sure you are using the latest version of all software programs and applications. You know computers can pick up bugs and viruses, but they can also become bogged down by miscellaneous programs and applications that you may not even be using. Below are some... ...