LastPass is a password management system that removes the inconvenience of remembering all of your passwords and increases security.
Discover tips and steps you need to take to protect your data, your electronics, and your identity.
IS&T provides access to Duo, a two-factor authentication application that leverages landlines and smartphones as an "Approve" or "Deny" system to identify users. Duo is a self-service web application that is being used for Touchstone-enabled web applications at MIT.
OpenID Connect (OIDC) is a RESTful authorization service that allows members of the MIT community to set authorization requirements for applications to access their RESTful Web APIs and Services at MIT. These requirements are based on OAuth2.0.
MIT Touchstone is a single sign-on web authentication service that allows members of the MIT community to log in to participating MIT and federated websites. When using a Touchstone-enabled application, your password will never be passed to the application server.
Protect your electronic devices from theft and your data from unauthorized access if lost or stolen.
Stopit is a confidential on-the-record venue for reporting harassment and other inappropriate behavior that occurs electronically at MIT.
Unwanted and unsolicited email is on average 78% of all email sent. To reduce the amount of "spam" coming into our inboxes, filters have been put in place on MIT's email system.
Most malware attacks occur through a combination of spam and compromised web pages. Interacting with spam can put your personal information at risk as well as download a virus to your machine that may spread to other computers on the network.
If your computer seems to be working fine, you may wonder why you should apply a patch. By not applying patches, you might be leaving the door open for malware to come in.
Media sanitizing is electronic file destruction. In the same way that paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.