Best Practices

Digital Self-Defense Training

DSD Logo

The Information Security Office provides Digital Self Defense training courses scheduled through the Center for Professional Development or by request. The program is divided into three courses: Introduction, Desktop Security Tools, and Information Handling. See below for more information about specific courses.

DSD 100 Practicing Digital Self-Defense

Designed for new RIT community members or as a refresher for others, Practicing Digital Self-Defense provides an introduction and exercises for identifying phishing attacks, constructing good passwords, and using mobile devices securely.

DSD 100 Practicing Digital Self-Defense Online Course

DSD 100 Practicing Digital Self-Defense is available as... ...

Cybersecurity Considerations for Traveling Abroad

Cybersecurity Considerations for Traveling Abroad

Do you travel abroad with a laptop or other mobile device? The information below will be helpful.

A couple of notes:

  1. This communication reviews Cybersecurity concerns. RIT Global Risk Management Services provides a more comprehensive overview of travel policies and considerations.
  2. Travel restrictions can change abruptly, both here and abroad. Review the U.S. State Department Alerts and Warnings before and during travel.

 

Traveling with a laptop and other mobile devices

Should you bring your RIT laptop?

  • It depends. Can

  • ... ...

Media Disposal Recommendations

Media Disposal Recommendations

... ...
Media Disposal Method

Paper

Use a shredder. Crosscut is preferred over a strip shredder. 

Disposal of paper records containing Private or Confidential  information should be accomplished by crosscut (or better) shredding, placement in a locked document destruction bin, or through vendor-supplied services under a contract approved by RIT Procurement Services.

CD, DVD, diskette, etc.

Use the media shredder (located at the ITS Service Desk, 7B-1113).

Hard Drives

If the hard drive is to

Creating Strong Passwords

Is your password easy to crack?

What is a secure password?

A secure password should be virtually impossible for others to guess. It should not contain or be based on personal information, and it should not be written down or given out to anybody.

RIT Information Security recommends:

  • Minimum 15 characters (at least 8 required)
  • Mixed upper and lower case letters
  • At least one number and at least one symbol

Minimum requirements for passwords can be found at: https://www.rit.edu/security/content/password

What should I avoid?

There are many ways people... ...

Avoid Questionable Mobile Apps

Avoid Questionable Mobile Apps

It is important to make sure a Mobile App is reliable before downloading it. Detecting malicious apps is not always easy, but there are a few steps you should take before downloading an app.

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

Android users have the highest risk of downloading malicious apps.  Researchers at Kaspersky found over 200,000 samples of mobile malware at the Google Play store and additional... ...