IS&T is now providing access to Duo, a two-factor authentication application that leverages cellphones, landlines and smartphones as an "Approve" or "Deny" system to identify users. Duo is a self-service web application that is being used for Touchstone-enabled web applications at MIT.
Discover tips and steps you need to take to protect your data, your electronics, and your identity.
OpenID Connect (OIDC) is a RESTful authorization service that allows members of the MIT community to set authorization requirements based on OAuth2.0 for Applications to access their RESTful Web APIs and Services at MIT.
The Virtual Private Network (VPN) assists MIT clients with connectivity on and off campus. IS&T recommends and supports Cisco's AnyConnect VPN, a VPN client that works on a wide variety of operating systems and hardware configurations.
Unwanted and unsolicited email, otherwise known as spam, is on average 78% of all email sent. To reduce the amount of spam coming into our inboxes, spam filters have been put in place on MIT's email system.
Most malware attacks today occur through a combination of spam and compromised web pages. Interacting with spam can put your personal information at risk as well as download a virus to your machine that may spread to other computers on the network.
Stopit is a confidential on-the-record venue for reporting harassment and other inappropriate behavior that occurs electronically
In an effort to address the growing security concerns around computing, IS&T offers a number of services aimed at making your computing experience safer. This includes providing you with information and educational opportunities to increase your safe computing awareness.
Media sanitizing is electronic file destruction. In the same way paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.
Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.
Passwords protect and limit access to personal data and to the IT resources at MIT.