Remote Access (VPN) Security Information

IMPORTANT SECURITY INFORMATION – READ THIS BEFORE CONNECTING TO VPN
  • The Health of Your Remote Computer Is CRITICAL
    When using the NU VPN, you are connected DIRECTLY from your remote computer into the University network. It is much like sitting at your University workstation. For this reason, the health and maintenance of your computer is critical. A virus, worm, bot or other infection or compromise on your remote computer could be easily passed to the University network and every connected workstation, causing compromise and disruption to University computers and the computing infrastructure. For this reason, all VPN users MUST have up-to-date antivirus software installed on their remote computer, along with all up-to-date operating system and application patches. NEVER attempt to connect to the VPN without assuring your remote computer is properly maintained as described above.
  • What you see is what you and others may get
    When using the NU VPN, your remote computer will likely be displaying, downloading and/or printing information that is privileged, confidential, and/or regulated. Confidentiality of University information MUST be maintained. When using the NU VPN, assure that unauthorized persons are not observing your work. Always log off before leaving your remote workstation, and safeguard all printed materials and files downloaded from University sources. Shred any printed documents no longer needed, and do not leave downloaded University files for unauthorized others to find.
  • Places NEVER to establish a VPN connection
    Computer types such as those listed below are sometimes compromised and not always well-maintained. They can be a severe threat to the confidentiality, integrity and availability of the NU network and University data. For this reason, NEVER establish a VPN connection to the University from the following types of computers:

    • public library computers
    • conference center computers
    • airport lounge computers
    • hotel computers (business centers or in-room supplied laptops)
    • any computer on which you have reason to believe an infection or other compromise may or does exist