Skip to content. | Skip to navigation


Protect the Workplace

“Creating a Culture of Cyber Security at Work”

Don’t assume you’re not important! Hackers use a combination of malware, software attacks, and social engineering. You may not be the actual target but just a way to get to the person they really want. It’s not about being paranoid it’s just modern life that has given unknown agents a whole set of new ways to unlock our defenses. The best defense is to be prepared and aware.

Security on our devices

McAfee Anti-virus: This helps with catching and preventing malicious known Viruses that can effect our devices. As long as our device are connected to a network, they will keep updating once a day for the latest Anit-virus updates.

Anti-virus software is a good tool to have to prevent known viruses from launching on our machines. Updating the Anti-virus, keeping the OS fully updated and having a desktop firewall, are a good start on protecting your device from possible threats.

Full Disk Encryption: While the device is shutdown, the whole drive will be encrypted. When the user of the device logs in with his/her correct credentials, only then will the drive become decrypted and the data accessible to the user.

    • Bitlocker: Microsoft’s full drive encryption solution
    • McAfee Disk Encryption: McAfee’s full drive encryption solution
    • FileVault 2 (Mac): Apple’s Full Disk Encryption for it Desktop Operating system.

Protecting devices from being hacked or abused

Use and regularly update anti-virus software and anti-spyware on all computers. Automate patch deployments to protect against vulnerabilities.

    • Employ anti-virus software (free for students, faculty and staff at Hunter)
    • Use disk encryption
    • Use anti-spyware tools
    • Update the OS
    • Secure your web browser
    • Update your apps

Integrity in our connections

Intergity in a connection would mean that the connection will have to be safe to use. A trusted network connection to the internet.
The best way to reach this goal will be:

    • Secure Your WiFi: Use a Encrypted Key to secure your connection, if you don’t you will be inviting anyone to your network connection.
    • Be wary about Free Public WiFi: Free Public Wifi allows anyone to join it’s network, even the malicious users.
    • Shut off your WiFi: this saves your battery life and prevents your device from advertising the networks it has visited.
    • SSL Email setup: this means that your email is being sent over an encrypted connection.
    • HTTPS: If you see this on you browser, this means that your connection to the webpage is encrypted.

Defending network integrity - Safe Networking

    • Avoid open Wifi networks
    • Secure your networks with port security, high-level encryption, strong passwords
    • Secure your home networks
    • Update network connectivity devices (e.g. Wifi basestations, Mifi routers, switches and routers)

Encrypting our data

The different kinds of encryption

Disk encryption (encrypting an entire hard drive)

      • Bitlocker
      • Filevault
      • McAfee (Intel) disk protection

Individual message or file encryption

      • PGP et. al. for email
      • Password-locking

Connectivity encryption

      • Protocol connection (SSL, TLS)
      • VPN

Click here to request Laptop Encryption

Alertness and Awareness

    • Implement Technical Defenses: firewalls, intrusion detection systems, and Internet content filtering.
    • Monitor, log, analyze, and report successful and attempted intrusions to your systems and networks.


Document Actions
IT - (Instructional Computing and Information Technology) website feedback:
Hunter College 695 Park Avenue NY, NY 10065 212.772.4000
212-772-5799 | email us
695 Park Ave
NY, NY 10065