In order to more precisely reflect the office’s core focus – protecting both computing and information assets of the university community – Information Technology Services’ security unit has been rebranded to Office of Information Security. This change is in name only! You will still receive the same great service you’ve come to expect, and OIS will continue to be a resource to the Northeastern community for all information security matters.
Remember, security is a shared responsibility. Do your part to help promote a safer and more secure computing environment by observing and supporting secure practices in your academic or business unit. If assistance is required, please contact email@example.com.
For more information, please visit the Office of Information Security website.
At the beginning of a new semester it is important to remind ourselves about best security practices. Information security is a team effort and every member of our community plays an important part in protecting our data. Below are a few helpful tips to ensure you start the year off right!
Your information is only as secure as your passwords. While we all would like to have passwords that are easy to remember, it’s important to not use passwords that are easily guessed. For example, do not use things like dictionary words, pet’s names, anniversary dates or any other data that may identify you.
Change passwords often. It is a good habit to change your passwords once a quarter. Link it to the seasons or a holiday so you don’t forget. Worried about remembering them? There are free apps, like Dashlane, LastPass, and KeePass, that let you store your passwords in a secure location – making it easy to access your different online accounts.
Use different passwords on different systems. No single password should be reused across multiple accounts. This way, if one of your accounts is compromised, they aren’t all compromised. Last year’s security breach at Adobe caused Facebook to alert certain users to update their Facebook passwords, due to the concern that the same password was used for both accounts.
Do not share your passwords. Your password should be kept as secret as your Social Security number, if not more so. Remember, Northeastern will never ask for your password.
Create challenge questions (and answers) that are actually a challenge. When creating your myNEU account challenge questions be sure to come up with a question and answer combination that is hard for anyone to guess, especially those who know you, or – even better – make the answer random. SecureNU has a few great ideas. Even xkcd has taken a look at password strength.
Remember to install patches and updates. The reminders always seem to come at the most inconvenient time, but please remember install all patches and updates. Not doing so could expose you and your information to viruses and theft. Additionally if your information is compromised it has the ability to compromise others at Northeastern. Try setting a time aside to install patches, such as at the end of the day, so it doesn’t interrupt your work.
Using wireless Internet on campus? Make sure to log into NUWave with your myNEU credentials for full access and a secure connection. NUwave-guest is a limited wireless network intended for guests only; it requires separate registration and access ends after eight hours. Be more secure and use NUwave. Living in upperclassmen housing that allows routers? Be sure to setup your router following the 2014-2015 ResNet Router/Wireless Access Security Requirements and Recommendations. [UPDATE – 8/15/2015: Routers are banned as of 8/15/2015. The residential wireless expansion project was completed on August 15, 2015. Details are available on the NUwave service page.]
Shopping for back to school supplies? Shopping and banking should only be done on a device that belongs to you and on a network that you trust. Free wifi can be appealing, but those networks are likely not secure – wait until you get home to buy those last few items on your list.
Bittorrent is too good to be true. The Northeastern University Appropriate Use Policy (AUP) prohibits the download, use or redistribution of any copyrighted material without authorization for the copyright holder.
Does something seem a little suspicious? All suspected security incidents should be reports to either the ITS Service Desk at 617.373.4357 (xHELP) or to the Office of Information Security at firstname.lastname@example.org.
Questions or concerns? Feel free to reach out to the Office of Information Security for assistance. We are here to help in the event that something does happen to your account.
You are sitting at your computer and an e-mail comes across your screen…
“Your account has been suspended. Please go to http://accountrecovery-neu.com to recover your account.”
You begin to panic – you have a paper due tomorrow, and you can’t submit it through Blackboard if you can’t access your account!
Before you click, STOP and THINK. Would Northeastern University ever ask you to validate your account through e-mail?
The correct answer is NO.
In the past few weeks, Northeastern University has been subject to a variety of phishing attacks. While most of us believe we would never fall for something like that, recent events have proven otherwise. The emails and websites are extremely convincing. In fact, some look just like an email you would receive from Northeastern University. A recent favorite is an phishing attempt pretending to be E-ZPass, where the email included text about its phishing policy to make it seem more legitimate.
Even the most technically savvy individual could fall for a phishing email. It is important to remember that Northeastern University will never ask you for sensitive information through an email.
Below are a few additional helpful tips to aid you in avoiding phishing attacks:
Delete all e-mails and messagesthat ask you to provide personal information. Legitimate companies will never ask for this information via email. As an extra step, you can forward e-mails to the organization they are supposedly coming from to ensure they are aware of the phishing attempt. Bank of America even has a process for reporting these fake emails.
Be cautious when downloading filesand opening attachments, regardless of who they are from. The files and attachments could be viruses designed to steal information from your computer.
Be on the lookout for generic-looking requests. Many phishing e-mails will be impersonal and use language such as “Dear Sir/Ma’am.” Banks and companies you do business with will, more often than not, send personalized emails.
Be on the lookout for poor spelling and grammar. Cyber criminals are not known for their spelling. Most organizations have staff who review any mass emails and wouldn’t allow it to go out with several mistakes. If you notice a lot of mistakes, it might be a phishing attempt.
Only provide personal or financial information through an organization’s website if you typed in the web address yourself and you see signals that the site is secure. For example, most sites that ask for personal or financial information will begin with HTTPS.
Phishing attempts could be made over the phone too. Remember to treat unsolicited calls with skepticism and to never provide personal information. Again, Northeastern University will never ask you for sensitive information through an unsolicited call. If something seems off, hang up and call the company back through an advertised number.
When in doubt, just ask. Northeastern University has a variety of areas you can reach out to for help. The ITS Service Desk is available 24/7 and can be reached by either e-mail at email@example.com or by phone at 617.373.4357 (xHELP).