The following tools should be used in combination to conduct security assessments.
Printers often handle RIT Confidential information, but they can easily be overlooked when securing a network. Use the following best practices to secure any printers you support:
Note: This requirement applies only to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run host intrusion prevention.
Encryption at RIT
Several RIT Security Standards refer to ISO-approved encryption. ISO-approved encryption is divided into two categories: Preferred and Acceptable. Preferred encryption methods were chosen based on standard industry usage and their ability to support RIT business processes. RIT's current product is SentinelOne.
Wireless Networking Safety
Wireless networks are generally considered to be less secure than wired networks. However with proper configuration and encryption enabled, they can provide more than adequate security for most users.