![]() Follow these best practices while engaging in remote working, teaching, and learning to help reduce the chance of the information and data you handle at MIT being compromised.If you handle personally identifiable information, install Spirion (formerly Identity Finder) to help you detect and securely delete or encrypt files containing sensitive information.This cloud-based backup solution makes it easy to recover information from computers that have been lost, stolen, or damaged by malware. Back up your computers using Code42 (previously called CrashPlan).We will continue to evaluate options to determine which product or products best serve the Institute’s needs. The Institute currently licenses LastPass, which has been in the news recently. Use a password manager to generate and protect strong, unique passwords. ![]() ![]() CrowdStrike provides advanced protection against emerging threats, using machine learning to detect patterns commonly seen in attacks. Sophos protects your computer against known viruses, worms, and malware. ![]() Install Sophos Anti-Virus and CrowdStrike Falcon.Enable automatic updates for your operating systems and software to protect against the latest security threats.Information Systems & Technology (IS&T) recommends that you take the following basic actions to protect the information you handle and to keep MIT safer: Please assist MIT in fulfilling its obligations by reporting an incident as soon as you become aware of it. Examples include the loss of a laptop or paper files malware or notification from a vendor of a security incident affecting MIT information. MIT may have time-sensitive legal and regulatory obligations if certain Institute information is compromised. We have also highlighted a few key resources below. You can take a quick quiz on the Information Protection website to find out the risk level for the information you handle at MIT, and see recommended actions to properly safeguard that information. Given increased cybersecurity threats and regulatory and compliance obligations, it’s important that each one of us understands our role in safeguarding information at MIT.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |