SECURITY: ITS Organization


Information Technology Services Security provides strategic planning and framework to support a safe and secure University IT environment by developing security policies, procedures, and standards. Security also provides research and recommendations for security solutions for Students, Faculty and Staff.

If you have a questionable e-mail, report it to

Firewalls represent one component of a strategy to combat malicious activities and assaults on computing resources and network-accessible information. (More...)

Phishing is the act of sending an e-mail message in an attempt to obtain private, sensitive information such as passwords or financial information by claiming to be a legitimate, trustworthy enterprise. There have been several phishing scams that have appeared to come from legitimate campus sources. You should be aware of what phishing is and what to do about it. (More...) 

Don't Take the Bait for Phishing Scams

Phishing Examples
Not sure what phishing might look like? Click here to view Phishing Examples. If you receive a questionable email please report to or contact the Help Desk.

Data Security
Data security threats can take many forms; however, developing good practices can minimize your exposure and make intrusion more difficult. (More...)

2 Step Verification
Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be. For information on 2-Step Verification and 2 Step Authentication, visit this page.

Pulse Secure can be installed by logging into and clicking on the appropriate bookmark to download and install the desired version of Pulse Secure for your operating system (Windows 32 or 64 bit, Mac OS or Linux). The Pulse Secure ReadMe file contains installation and configuration instructions. Once it is installed, Pulse Secure will be listed in your programs and as a shortcut in the Windows System Tray or Mac Menu Bar. You do not need to access the SSL VPN web page each time you want to connect via VPN.

Malware is a term which is short for malicious software. It is software which is designed to infiltrate your computer, often to steal sensitive information or to send spam. Malware includes things such as tracking software, keyloggers, "bots", rootkits, viruses, trojan horses, worms, etc. More information is available in the Malware FAQ.

Ransomware is a term that describes malicious software that attacks a computer and requires payment of a "ransom" to remove the harmful effects of the software.

Spread through e-mail attachments, links in Twitter or Facebook posts and through infected websites (often porn sites) this ransomware has been seen targeting companies through phishing attacks.

If you think your computer is infected or have questions, please contact the ITS Help Desk at 607-777-6420 or e-mail (More...)

Virus Protection
New computer viruses are appearing all the time so it's important to keep your anti-virus software up-to-date. Computing Services provides the latest versions of anti-virus software on the web to the Binghamton University community for both the Windows and Macintosh platforms. Click here for Anti-Virus protection.

Top Ten Security Tips - FOR COMPLETE LIST, VISIT:

  1. Back up your data!
  2. Create and remember strong passwords.
  3. Do not download from unknown sources.
  4. Do not reply to e-mails requesting login or bank account information.
  5. Install anti-virus software.
  6. Regularly update your operating system and software applications.
  7. Remove malware, spyware and viruses.
  8. Control access to your computer.
  9. Protect sensitive data.
  10. Stay informed - follow us on social.

Helpful links:
SANS Institute Security Tip of the day

Follow us Instagram and Twitter for tips on security and information technology.