Mitigating Threats
The threat posed by global cyber-attacks, especially phishing and ransomware threats, is a serious concern for many organizations. Cybercriminals use phishing emails to induce individuals to reveal personal information, such as passwords and credit card numbers, or to compromise accounts to gain access to systems like Banner and Workday. Ransomware is a unique cyber-attack technique where cybercriminals encrypt data then demand money to release it.
While WPI Information Technology employs strategies and tools which work together to protect against these threats, community members also play a role in protecting WPI data and limiting personal risk. The following best practices are a good starting point.
_________________________________________________________________
Protect Your Login
IT Will Not Ask for Your Password
No one in IT will ever ask for your passwords and you should never provide them. Never share your passwords. Your WPI password should differ from other passwords for personal use.
Secure Passwords
Another way to guard your access is to make sure that your passwords are complex and secure.
Tips for creating a secure password
Multi-Factor Authentication (MFA)
WPI uses MFA to ensure that sensitive data stored in the cloud is protected. Please ensure you have setup MFA.
Multi-Factor Authentication________________________________________________________________
Protect Your Data
Data Backup
Crypto and ransomware infections can be catastrophic for users because they encrypt and restrict access to all files on your machine. The best way to combat this type of attack is to make sure that your data is securely and regularly backed up.
Use WPI Storage
If you use IT-managed storage options, such as OneDrive and network file storage services, backup is already done for you!
Get Started with OneDrive________________________________________________________________
Beware of Phishing and Click Wisely
How Phishing Works
Phishing attacks use social engineering to try to steal your credentials or identity. Do not open links or attachments in an email if you are not expecting them - even if you know and trust the sender. Cyber criminals frequently spoof email addresses and web links. Be vigilant. Trust but verify.
Report Suspicious Activity
Report suspicious emails to phishing@wpi.edu. This will help Information Security to identify current phishing threats targeting the WPI community, so they may take appropriate action.
Report A Phishing Attempt________________________________________________________________
Patch/Update Devices and Reboot Often
WPI Devices
WPI IT-managed computers are protected through regular updates and patches which are rolled out on a regular schedule.
Automatic Updates
Setup personal devices to automatically apply updates and restart devices often.
Check IT News
Watch IT News for information about patches and be attentive to any required actions.
Check IT News________________________________________________________________
Do you suspect your computer is infected?
If you think you may have a virus, malware, or ransomware please call IT immediately at 1-508-831-5888 for further instructions.
Patch/Update Devices and Reboot Often
WPI Devices
WPI ITS-managed computers are protected through regular updates and patches which are rolled out on a regular schedule.
Automatic Updates
Setup devices to automatically apply updates and restart devices often.
Check IT News
Watch IT News for information about patches and be attentive to any required actions.
Check IT NewsDo you suspect your computer is infected?
If you think you may have a virus, malware, or ransomware please call ITS immediately at 1-508-831-5888 for further instructions.