IS&T provides access to Duo, a two-factor authentication application that leverages cellphones, landlines and smartphones as an "Approve" or "Deny" system to identify users. Duo is a self-service web application that is being used for Touchstone-enabled web applications at MIT.
Discover tips and steps you need to take to protect your data, your electronics, and your identity.
OpenID Connect (OIDC) is a RESTful authorization service that allows members of the MIT community to set authorization requirements based on OAuth2.0 for Applications to access their RESTful Web APIs and Services at MIT.
In an effort to address the growing security concerns around computing, IS&T offers a number of services aimed at making your computing experience safer. This includes providing you with information and educational opportunities to increase your safe computing awareness.
IS&T can help to detect, respond to, and recover from intrusions and data disclosure incidents, including IT security incidents involving electronic MIT business data of any kind.
As part of doing business at an institute of higher learning and as an Internet Service Provider (ISP), MIT must ensure that individuals who use its IT resources are following the rules and legal requirements of the local, state and federal governments. DMCA (Digital Milennium Copyright Act), PCI-DSS (Payment Card Industry Data Security Standards), and the Massachusetts Data Privacy Law 201 CMR 17 are just a few regulations that MIT must comply with.
The Virtual Private Network (VPN) assists MIT clients with connectivity on and off campus. IS&T recommends and supports Cisco's AnyConnect VPN, a VPN client that works on a wide variety of operating systems and hardware configurations.
Unwanted and unsolicited email, otherwise known as spam, is on average 78% of all email sent. To reduce the amount of spam coming into our inboxes, spam filters have been put in place on MIT's email system.
Most malware attacks today occur through a combination of spam and compromised web pages. Interacting with spam can put your personal information at risk as well as download a virus to your machine that may spread to other computers on the network.
Stopit is a confidential on-the-record venue for reporting harassment and other inappropriate behavior that occurs electronically
Media sanitizing is electronic file destruction. In the same way paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.
Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.