IT security is an ongoing effort that strives to protect university systems, networks and data from unauthorized access, disclosure, disruption, modification, or destruction.
While the term "computer security" may focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer, in most cases, IT security focuses on data, networks and systems and has three primary goals.
Our Information Security Officer is responsible for IT security and works with other university faculty and staff to ensure that the three goals below are met. The Information Security Officer reports to the Vice President for Information Technology & CIO.
For more information, contact 澳门老奇人论坛's Information Security Officer.
Taking ownership of your security means taking back the privacy of your online profiles and your devices. It means tightening up what random people can learn about you online. At best, people are just nosy. But at worst, they can use oversharing to target you to steal your money or your identity. Take some time to review the privacy settings on your profiles (i.e. LinkedIn, Facebook, Instagram, Twitter, etc.). Double-check that your posts are for friends-only and are not public.
Take inventory of the apps on your phone. Some request to track your location when not being used. Others want to read your messages. Scroll through your apps and delete the ones that you don't use, especially if you had to make security exceptions to allow them access to your location, phone and microphone. Only install apps from trusted sources such as the Apple App Store and Google Play Store. If you'd like tips on owning your online profiles and ensuring the security of your devices, please reach out to us in IT Security.
Protecting yourself means becoming aware of the attacks and manipulations that can be used against you. Phishing is very common and increasingly hard to spot. Is the sender claiming your account will be disabled if you don't do something? Are they giving you an offer that's too good to pass up? There are a lot of common red flags to look out for. IT Security has a web page with more information on phishing tactics. You can also take a short practice quiz to improve your skills at spotting phishing emails.
Why do cybercriminals spend time trying to trick you? Because it is incredibly profitable. If they send 10,000 emails trying to get victims to buy a gift card and email them the number and only 5 people each send the $400 in card numbers they requested, they've just made $2,000. So many lose money to cybercriminals each year that it is difficult for police and the FBI to keep up. That's why it's important for you to be aware of their tactics. You are your first line of defense in protecting yourself from cyber attacks. If you ever receive an email that you suspect is phishing, please forward it to itsecurity@radford.edu and we'll be glad to take a look.
Securing your accounts means adding extra layers of protection. Have you ever had your bank text you a code to login to online banking from a new browser? That's two-factor authentication. It requires you to have your phone on you when logging in. If someone guesses your password, but doesn't have your phone, then they can't get into your account. At 澳门老奇人论坛, we require Duo for two-factor authentication. Since requiring it campus-wide October 2018, our number of compromised accounts has dropped astronomically.
Besides using two-factor for your 澳门老奇人论坛 account, enroll in two-factor for each of your online profiles and mail accounts. Google, Facebook, Twitter, Instagram, etc. all provide that added layer of security as an option.
Securing your accounts also means setting strong passwords or passphrases. If you have any questions on securing your accounts and profiles, please reach out to us in IT Security and we'll be glad to provide assistance.
澳门老奇人论坛's Division of Information Technology will never ask for your password via email. Do not share your password with anyone.