Search Google Appliance

Security

Discover tips and steps you need to take to protect your data, your electronics, and your identity.

Spam Filtering

To reduce the amount of spam coming into our inboxes, IS&T has put filters in place on MIT's email system.

Most malware attacks occur through a combination of spam and compromised web pages. Interacting with spam can put your personal information at risk as well as download a virus to your machine that may spread to other computers on the network.

Legal Compliance

As part of doing business at an institute of higher learning and as an Internet Service Provider (ISP), MIT must ensure that individuals who use its IT resources are following the rules and legal requirements of the local, state, and federal governments. DMCA (Digital Milennium Copyright Act), PCI-DSS (Payment Card Industry Data Security Standards), and the Massachusetts Data Privacy Law 201 CMR 17 are just a few regulations that MIT must comply with.

Encryption

Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.

Data Discovery

Data discovery is the activity of finding where sensitive data resides so that it can be adequately protected or securely removed. IS&T distributes Spirion (formerly Identity Finder), a software tool that can easily retrieve electronic data stored on computers and servers.

Media Sanitizing

Media sanitizing is electronic file destruction. In the same way that paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.

Pages

Subscribe to RSS - Security