Discover tips and steps you need to take to protect your data, your electronics, and your identity.
To reduce the amount of spam coming into our inboxes, IS&T has put filters in place on MIT's email system.
Most malware attacks occur through a combination of spam and compromised web pages. Interacting with spam can put your personal information at risk as well as download a virus to your machine that may spread to other computers on the network.
If your computer seems to be working fine, you may wonder why you should apply a patch. By not applying patches, you might be leaving the door open for malware to come in.
As part of doing business at an institute of higher learning and as an Internet Service Provider (ISP), MIT must ensure that individuals who use its IT resources are following the rules and legal requirements of the local, state, and federal governments. DMCA (Digital Milennium Copyright Act), PCI-DSS (Payment Card Industry Data Security Standards), and the Massachusetts Data Privacy Law 201 CMR 17 are just a few regulations that MIT must comply with.
Encryption is a method of securing data by scrambling the bits of a computer's files so that they become illegible. The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password.
Data discovery is the activity of finding where sensitive data resides so that it can be adequately protected or securely removed. IS&T distributes Spirion (formerly Identity Finder), a software tool that can easily retrieve electronic data stored on computers and servers.
IS&T can help to detect, respond to, and recover from intrusions and data disclosure incidents. This includes IT security incidents involving electronic MIT business data of any kind.
The Virtual Private Network (VPN) assists with connectivity on and off campus. IS&T recommends and supports Cisco's AnyConnect VPN, a VPN client that works on a wide variety of operating systems and hardware configurations.
Media sanitizing is electronic file destruction. In the same way that paper files containing sensitive information can be shredded or burned, electronic files can be destroyed using various methods. The most effective form of electronic data destruction is done with file shredding software.