Information Security

Information Technology Services Security provides strategic planning and framework to support a safe and secure University IT environment by developing security policies, procedures, and standards. Information Security also provides research and recommendations for security solutions for Students, Faculty and Staff. 

Report Cyber Incidents to Information Security to security@binghamton.edu. Report Phishing and Scam emails in Gmail by selecting "Report Phishing" or "Report Scams".

Follow these 6 steps to enhance your security:

    1. Protect your accounts with strong authentication. 2 Factor Information is here.
    2. Keep your software updated.
    3. Avoid phishing attempts.
    4. Use unique passwords (consider a password manager).
    5. Protect your mobile devices.
    6. Use trusted security tools.

Firewall

Firewalls are a critical component in safeguarding computing resources and network-accessible information.

Phishing

Phishing is the act of sending an email message in an attempt to obtain private, sensitive information such as passwords or financial information by claiming to be a legitimate, trustworthy enterprise. There have been several phishing scams that have appeared to come from legitimate campus sources. You should be aware of what phishing is and what to do about it.

Data Security

Protect your data by developing good security practices. Minimize your exposure to data security threats. Learn more.

Two-Step Verification

Set up Two-Step Verification by clicking on the °®¶¹´«Ã½ logo in the upper right corner of the BMail web page and selecting the Google Account button. Visit our Two-Step Verification page for step-by-step instructions. For information on Two-Step Verification and Two-Step Authentication, visit .

is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.

VPN

Pulse Secure can be installed by logging into and clicking on the appropriate bookmark to download and install the desired version of Pulse Secure for your operating system (Windows 32 or 64 bit, Mac OS or Linux). The Pulse Secure ReadMe file contains installation and configuration instructions. Once it is installed, Pulse Secure will be listed in your programs and as a shortcut in the Windows System Tray or Mac Menu Bar.
Note: You do not need to access the SSL VPN web page each time you want to connect via VPN.

Malware

Malware, short for malicious software, can infiltrate your computer and compromise your data. It includes various threats like viruses, spyware, and trojan horses. Learn how to protect your devices from these insidious intruders by visiting the Malware FAQ  page.

Ransomware

Ransomware is a term that describes malicious software that attacks a computer and requires payment of a "ransom" to remove the harmful effects of the software.

Spread through email attachments, links in Twitter or Facebook posts and through infected websites (often porn sites) this ransomware has been seen targeting companies through phishing attacks. Visit the Ransomware page for more information and and how to protect yourself from this kind of attacks.

If you think your computer is infected or have questions, contact the ITS Help Desk at 607-777-6420 or email helpdesk@binghamton.edu

Virus Protection

New computer viruses are appearing all the time so it's important to keep your anti-virus software up-to-date. Computing Services provides the latest versions of anti-virus software on the web to the °®¶¹´«Ã½ community for both the Windows and Macintosh platforms. Visit the Anti-Virus protection page for more Information.

Protect your strong passwords | Password Best Practices

In an age where digital security is paramount, safeguarding your passwords is crucial. Explore best practices for password management and understand the importance of using strong, unique passwords.

Why Protect Your Passwords? In modern times, it seems as though the is more rapidly beginning to dictate our lives. This means that the more secure you keep your information, the less likely you are to be negatively affected by this change. This is where things like password managers become extremely useful.

In the world of the highly powerful and sometimes highly dangerous World Wide Web, you may be skeptical of the efficacy of such applications. Why would I trust anyone with all of my passwords when I can secure them myself? The problem is, we already do this with each web based application we use on a daily basis. Typing a password into Google is the same as saying "You can have access to my personal information as long as you keep it safe." In fact, in February 2016, over 1 million Gmail accounts were targeted by government backed hackers looking to steal your personal information. Being skeptical of password thieves may seem like a safe bet, but sometimes we don't even know where those thieves may appear.

The other problem with human crafted passwords is that we are naturally lazy. We prefer ease of entry over security and safety. All of these factors make it very easy for attackers to claim access to our accounts which may not seem like a problem until you realize how much information you really have in the Internet of Things. 

Top 10 Security Tips

    1. Back up your data!
    2. Create and remember strong passwords.
    3. Do not download from unknown sources.
    4. Do not reply to emails requesting login or bank account information
    5. Install anti-virus software.
    6. Regularly update your operating system and software applications.
    7. Remove malware, spyware and viruses.
    8. Control access to your computer.
    9. Protect sensitive data.
    10. Stay informed - follow us on social.

Helpful Links
For a more comprehensive list of security tips, please visit Phishing page and checkout out this link for more information