Welcome to WPI from the Information Security team!

We support your working, teaching, learning, and living at WPI by safeguarding WPI's network, securing data, and providing the community with best practices through education and policy. We frequently inform the community through news and articles on the WPI Hub.

Information Security

Here are are some vital topics as you get started on our enterprise network. Please do not hesitate to contact us if you have questions, concerns, or need to report an issue. We are also available if you would like to make an appointment or learn more about Information Security.

Contact Us

Secure Computing

Phishing

This has become a real epidemic. Phishing is when someone attempts to extract your personal information, most commonly through email. A few notes about protecting yourself, and your data from phishing attacks: 

  • No one in IT will ever ask you for a password. You should NEVER provide it or other confidential info!
  • Email with [EXT] in the subject line originated outside of WPI.
  • Don’t click on links in or reply to questionable emails! 
  • Report phishy emails to IT. 
Is an email really from someone at WPI?Phishing ExplainedReport Phishing

Viruses and Ransomware: 

Here are best practices to prevent cybercriminals from gaining access to your machine.

Prevent Ransomware Attacks

Personal Devices

If you are using a personally-owned computer, tablet, phone, or other device at WPI, here are some reminders.

  • Do not leave devices unattended in public spaces.
  • Perform regular updates to operating systems and anti-virus/anti-malware tools.

The best way to keep data safe is by following our Information Security Policies, abiding by the Acceptable Use Policy (AUP), and making sure you protect your passwords.

Login Safety

Using a unique password or passphrase for your WPI account is ideal. WPI also employs MultiFactor Authentication (MFA) to secure your account.

Password SafetyTips for Creating a Secure PasswordMFA

WPI's Acceptable Use Policy (AUP)

Full AUPAUP Quick Reference Guide with Examples

Some Important Policy Points

  • Use WPI systems and services  for academic and university business purposes.
  • Use WPI technology resources for ethical and legal activities that comply with federal, state and local laws.
  • Respect WPI property and resources. WPI retains the right to audit activity and deny network access in response to any activity that is not in compliance with WPI policy.
  • Respect other users’ personal property and privacy.
  • The WPI network, systems, and software cannot be used for commercial purposes.

Response to AUP Violations

Our team investigates and responds to actions that do not align with the AUP. We meet with those who have committed the violation to discuss the action and policy. Some offenses require further action and/or referrals to the Dean of Students, Talent and Inclusion, and the Campus Hearing Board.