Information Technology Services Security provides strategic planning and framework to support a safe and secure University IT environment by developing security policies, procedures, and standards. Information Security also provides research and recommendations for security solutions for Students, Faculty and Staff.
If you have a questionable email, report it to firstname.lastname@example.org.
For the most current phishing scams to avoid, go to the ITS Phish Tank.
Setting up 2FA? See below, and go to our 2FA page.
Important Covid related links for review:
COVID-19 Security Resource Library
A compilation of tips and recommendations from NCSA (National Cyber Security Alliance) and its partners on ways to stay safe online, as well as how to avoid cyber threats and scams during this pandemic.
Educause: Transitioning to Remote Work - As colleges and universities transition to online courses and remote work because of COVID-19, the author shares some lessons and tips for working virtually.
Questions about the Know Be4 required training? Click here.
STOP.THINK.CONNECT. Lock Down YOUR Login.
6 STEPS to BETTER SECURITY: 1. Protect your accounts with strong authentication. 2. Keep software updated. 3. Avoid Phishing Attempts 4. Use UNIQUE passwords (or better yet, a password manager). 5. Protect mobile devices. 6. Use trusted security tools.
WHAT IS PHISHING? | PHISHING EXAMPLES | ITS PHISH TANK (latest Bing directed phishing scams) | Coronavirus hoaxes
Phishing is the act of sending an email message in an attempt to obtain private, sensitive information such as passwords or financial information by claiming to be a legitimate, trustworthy enterprise. There have been several phishing scams that have appeared to come from legitimate campus sources. You should be aware of what phishing is and what to do about it. (More...)
Set up 2-Step Verification by clicking on the Binghamton University logo in the upper
right corner of the BMail web page and select the Google Account button. On the account
page, select the Security menu from the left and select 2-Step Verification to get
started with the process...
Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be. For information on Two-Step Verification and Two-Step Authentication, visit this page.
Pulse Secure can be installed by logging into https://ssl.binghamton.edu and clicking on the appropriate bookmark to download and install the desired version of Pulse Secure for your operating system (Windows 32 or 64 bit, Mac OS or Linux). The Pulse Secure ReadMe file contains installation and configuration instructions. Once it is installed, Pulse Secure will be listed in your programs and as a shortcut in the Windows System Tray or Mac Menu Bar. You do not need to access the SSL VPN web page each time you want to connect via VPN.
Malware is a term which is short for malicious software. It is software which is designed to infiltrate your computer, often to steal sensitive information or to send spam. Malware includes things such as tracking software, keyloggers, "bots," rootkits, viruses, trojan horses, worms, etc. More information is available in the Malware FAQ.
Ransomware is a term that describes malicious software that attacks a computer and requires payment of a "ransom" to remove the harmful effects of the software.
Spread through email attachments, links in Twitter or Facebook posts and through infected
websites (often porn sites) this ransomware has been seen targeting companies through
If you think your computer is infected or have questions, contact the ITS Help Desk at 607-777-6420 or email email@example.com. (More...)
New computer viruses are appearing all the time so it's important to keep your anti-virus software up-to-date. Computing Services provides the latest versions of anti-virus software on the web to the Binghamton University community for both the Windows and Macintosh platforms. Click here for Anti-Virus protection.
Protect Your Strong Passwords | Password Best Practices
Why Protect Your Passwords? In modern times, it seems as though the Internet of Things is more rapidly beginning to dictate our lives. This means that the more secure you keep your information, the less likely you are to be negatively affected by this change. This is where things like password managers become extremely useful.
In the world of the highly powerful and sometimes highly dangerous World Wide Web, you may be skeptical of the efficacy of such applications. Why would I trust anyone with all of my passwords when I can secure them myself? The problem is, we already do this with each web based application we use on a daily basis. Typing a password into Google is the same as saying "You can have access to my personal information as long as you keep it safe." In fact, in February 2016, over 1 million Gmail accounts were targeted by government backed hackers looking to steal your personal information. Being skeptical of password thieves may seem like a safe bet, but sometimes we don't even know where those thieves may appear.
The other problem with human crafted passwords is that we are naturally lazy. We prefer ease of entry over security and safety. All of these factors make it very easy for attackers to claim access to our accounts which may not seem like a problem until you realize how much information you really have in the Internet of Things. MORE...
Top 10 Security Tips - FOR COMPLETE LIST, VISIT: https://www.binghamton.edu/its/about/organization/security/phishing.html
- Back up your data!
- Create and remember strong passwords.
- Do not download from unknown sources.
- Do not reply to emails requesting login or bank account information.
- Install anti-virus software.
- Regularly update your operating system and software applications.
- Remove malware, spyware and viruses.
- Control access to your computer.
- Protect sensitive data.
- Stay informed - follow us on social.
SANS Institute Security Tip of the day