Cybersecurity Awareness

Security Reminders as We Approach Tax Season

General reminders and best practices: File electronically and use direct deposit for the quickest refunds. File early - the earlier, the better. Filing early helps prevent identity fraud; others cannot file a fake return in your name if you have already filed. Remember that the IRS will never request payment over the phone, or ask for personal information through emails or text messages

Data Privacy Week 2022

January 24 - 28th is Data Privacy Week

Data Privacy Week is an annual campaign to spread awareness about data privacy and educate individuals on how to secure their personal information. It also works to encourage businesses to respect privacy and be more transparent about how they collect, store and use data.

This year, Data Privacy Week 2022, spotlights the value of information and how to “Keep It Private”. Get started with NCA’s ...

Data Privacy Day 2020

Manage Your Privacy Settings: 1. Secure all devices, especially smartphones.

Smartphones are carried by virtually everyone and often they contain our most personal information. Whether iPhone or Android, research the best way to secure it for full privacy including options such as remote wipe.

2. Use a unique password for each site.

That way, if one of your passwords gets compromised, the others are still safe. Use complex passwords and never share them. Using multi-factor authentication (MFA) wherever possible will help protect you even more. Keep your university and personal...

MSSND: How to Secure Devices

Device Security

If you have a personally-managed Windows, Mac, IOS, or Android device that needs to comply with MSSND requirements, follow the step-by-step instructions below for how to configure your device to meet campus policy.

MSSND #1: Patching and Updates

We also provide optional guidance to assist with achieving the “...

Data Privacy Week Posters

Own Your Privacy

Learn how to review privacy settings for Google Calendar (bCal), Google Groups (bConnected Lists), and Google Drive (bDrive).

Click on the image(s) to download the pdfs.

Securing Remote Desktop (RDP) for System Administrators

How secure is Windows Remote Desktop?

Remote Desktop sessions operate over an encrypted channel, preventing anyone from viewing your session by listening on the network. However, there is a vulnerability in the method used to encrypt sessions in earlier versions of RDP. This vulnerability can allow unauthorized access to your session using a man-in-the-middle attack.

Remote Desktop can be secured using SSL/TLS in Windows Vista, Windows 7,...

Database Hardening Best Practices

This checklist was developed by IST system administrators to provide guidance for securing databases storing sensitive or protected data. Implementing these security controls will help to prevent data loss, leakage, or unauthorized access to your databases.

Physical Database Server Security The physical machine hosting a database is housed in a secured, locked and monitored environment to prevent unauthorized entry, access or theft. Application and web servers are not hosted on the same machine as the database server...

Network Printer Security Best Practices

Multifunction printers (MFPs) are experiencing an identity crisis: IT administrators don't always see them as the full-fledged networked computers they really are. But attackers do - and they are finding them increasingly very attractive!

These printers, shoved in the corner of the office and quietly going about their business of copying, printing, faxing and scanning, might not seem to pose any real security risk. But like any networked device, if not properly managed, they can expose sensitive campus data to unauthorized access and misuse.

To secure your printers from...

Data Privacy Videos

Short videos for protecting your privacy online

Too busy to read our articles? Here are three, short videos to give you some tools to help you "Own Your Privacy."