MIT IS&T
MIT IS&T

Information Security

Protect MIT devices and information

IS&T is committed to strengthening the security of MIT's infrastructure and information. 

Even computers that don’t appear to have any valuable information can be attractive targets for attacks. Compromised computers and other devices can be used as a foothold allowing attackers to spread through the network. Networked devices in MIT's public IP space are constantly under attack from devices across the globe. IS&T provides a variety of security services and software to protect the MIT community.

Protect yourself

Take steps to protect your computing and the information you handle at MIT.

  • Enable automatic updates for your operating systems and software to protect against the latest security threats.
  • Install Sophos Anti-Virus and CrowdStrike Falcon. Sophos protects your computer against known viruses, worms, and malware. CrowdStrike provides advanced protection against emerging threats, using machine learning to detect patterns commonly seen in attacks.
  • Use a password manager such as LastPass to generate and protect strong, unique passwords.
  • Back up your computers using CrashPlan. This cloud-based backup solution makes it easy to recover data from computers that have been lost, stolen, or damaged by malware.
  • If you handle personally identifiable information (PII), install Spirion to help you detect and securely encrypt or delete files with sensitive information.

Be secure when working remotely

Working, teaching, and learning away from the MIT campus poses new risks to securing information. IS&T recommends that community members follow these best practices when engaging in activities remotely to help reduce the chance of the information and data you handle at MIT being compromised.

  • Make sure your devices are running newer operating systems supported by the vendor and that all updates have been applied.
  • When exchanging high risk (i.e. sensitive or personal) information over email (e.g. birth certificates, loan applications), make sure to protect it by encrypting files before sharing.
  • Make sure your home router’s firmware is up-to date, that you have changed the default password to something strong, and that you have enabled WPA2 encryption for your home WiFi network.
  • Use MIT-approved and licensed enterprise video conferencing tools, such as Zoom and Microsoft Teams, which offer protections for your security and privacy, and follow suggested best security practices.
  • If accessing systems on campus from remote locations, securely configure the remote connection with encryption and multi-factor authentication.

Beware of phishing and other scams

Phishing emails and email scams continue to be an effective way for scammers to steal money, credentials, or install malware. Many of these emails are targeted to a specific department or lab, and may appear to come from someone you know or do business with. If you receive an email from a colleague or friend, but something doesn’t seem right, reach out to that person directly via another method, such as by phone or Slack, to be sure it is not a scam.

Be suspicious of emails or texts asking you to click a link or use a QR code to keep your account open or retrieve quarantined emails. If you want to visit that account, type the address directly in your browser.

Scams often involve fake login pages and may even replicate Touchstone. Do not accept any Duo requests that you did not initiate. If you receive a Duo push or call that you did not initiate, change your password immediately and notify the IS&T Information Security team.

Phishing emails often include fake login pages to M365 to steal your username and password and may even include a captcha. This adds legitimacy and helps the scammers get past spam filtering.

Scammers may impersonate Apple, Dell, Microsoft, Geek Squad,  or even IS&T and urge you to call tech support or install software. Contact the IS&T Service Desk directly if you are ever asked to contact tech support. 

Report suspicious emails to the IS&T Information Security team. If your mailbox is in Office 365, there is a “PhishAlert” button to make the process easier. If your mailbox is not in Office 365, or you are not a member of the MIT Community, please forward the email as an attachment (this will send the original email to us as a .eml file) to phishing@mit.edu. The IS&T Security team will take steps to protect the community.

Learn more

MIT's Information Protection website provides access to policies and guidance on safeguarding information at the Institute. The Awareness I: IT Security and Awareness II: IT Security courses are available in the Atlas Learning Center.

Report an IT security incident

It's important to report any IT security incident as soon as you are aware of it so the Security team can take proper steps to limit the impact and extent of loss, investigate, protect other members of the MIT community, and meet any regulatory or legal requirements.

If you believe a breach of MIT information occurred, immediately report the IT security incident by sending email to security@mit.edu. The IS&T Security team will contact you to evaluate the situation and determine the next best step. If necessary, they will assemble the Data Incident Response Team. You should not address these situations on your own, as that may corrupt forensic information needed to determine the scope of the issue and the risks to MIT.