Learn

Identity Theft

One of the main motives of cybersecurity attacks is identity theft. Identity theft is the deliberate use of someone else’s identity, usually to use credit.

Phishing emails are commonly used to scam account information or install malware that sends information from your device. Be careful what links you click on.

Identity theft doesn’t just happen online. Discarded bank statements, bills, receipts, and old hard drives are also used by identity thieves.

Victims

If you think you have been a victim of identity theft, take action immediately. Contact any credit card issuers and financial institutions with... ...

Keeping Safe

Keeping Safe: Guidelines and Best Practices

Not sure how to keep yourself, your information, and your devices safe? Click on the headings below for best practices, resources, and more; also be sure to check out our blog for more specific content, answers to your information security questions, and best practices guides!

... ...

Subject Area

Comments

Securing your Computer

Free downloads and instructions to support the Desktop and Portable Computer Standard.

Mobile Devices

Learn how to

Security Education, Training, & Awareness

Security Education, Training, & Awareness

Information security is a complex and constantly changing field that individuals at every level of the organization need to keep pace with in order to keep RIT information resources secure.  RIT offers the following education training and awareness programs to assist everyone from end user to system administrators to keep current with information security trends.

Academic Education

  • The GCCIS Department of Computing Security provides a variety of information security courses at the graduate and undergraduate level.

Training

  • Orientation sessions: The ISO often provides introductory information security training and materials at new student and new
  • ... ...