Skip to content. | Skip to navigation

Masterlinks
You are here: Home IT - (Instructional Computing and Information Technology) IT Security Cyber Security Month 2016 Cyber from the Break Room to the Board Room

Cyber from the Break Room to the Board Room

Week 2: October 10-14, 2016

As we move further into the Information Age, we must recognize a shared responsibility to make cyberspace a more secure environment for ourselves and others. There are things you can do right now to protect fellow students and colleagues from online risks by becoming a cybersecurity advocate in your home, office, and the community.

Practical Security

Networked environment

Individuals

  • Make your passwords complex, or use a passphrase (a string of nonsense words).
  • Use a different password/phrase for every site, and never share them with anyone else.
  • Be wary of questions about your systems or IT by strangers, salespeople or marketers

Supervisors

  • Establish clear practices regarding use of the department’s information technology and student information.
  • Beware of unauthorized use or access to your systems.·
  • Report successful and attempted intrusions to your systems networks.

Physical environment

  • Check for identification and ask individuals to identify the purpose of their visit to your workplace.
  • Report broken doors, windows, and locks to your organization or building’s security personnel as soon as possible.
  • Back up or copy sensitive and critical information and databases.
  • Keep an inventory of your most critical equipment, hardware, and software.

Tips

“Lock it when you Leave it”

  • Your work may contain sensitive information and it is your responsibility to keep it safe, especially in a shared workspace. Lock your computer and mobile device screen or log off if you are stepping away.
  • Never leave sensitive information open, unattended and/or unprotected.

Avoid being cracked or jacked

  • Encrypt your portable devices.
  • Don't attach devices to unknown networks or computers.
  • Avoid using open networks.

Protect confidential information

  • Never provide student information to anyone besides that student; this includes when posting grades, returning papers or talking to parents. Student education records are covered by FERPA.
  • Encrypt confidential information before transferring it to another person or device.

Security Awareness

Please visit the CIS Information Security Awareness page for more material. Here you will a CUNY 30-minute interactive video (Adobe Flash required), and other orientation material.

The Hunter website also has a page linking to CUNY CIS Information Security policies and procedures

Document Actions
IT - (Instructional Computing and Information Technology) website feedback:
Hunter College 695 Park Avenue NY, NY 10065 212.772.4000
212-772-5799 | email us
HUNTER COLLEGE
695 Park Ave
NY, NY 10065
212.772.4000