IT Security: Protecting Personal and University Information
We don't usually think of using a computer as risky behavior but without taking measures to protect personal information it can be; hackers could end up pirating social security numbers, passwords, credit card numbers, date of birth, medical information and other critical records.
And it's not just a matter of being smart when using the Internet. As a mobile society, the risk of losing a laptop or Smartphone or having it stolen also is something to be concerned about.
Hackers are relentless in trying to get personally identifiable information and financial resources; it's important to remain vigilant about threats, and solutions to address those threats. Details on how to protect your information are available on Blackboard (click "UNH Faculty and Staff" then "IT Policy & Security").
Restricted information must only be stored in approved systems. Unauthorized disclosure or access to such information has serious consequences. Identity Finder is a computer program that helps you look for social security numbers, credit card numbers and other protected information and remove it from vulnerable locations, such as your computer.
Check out the Identity instructions on Blackboard and run a scan. If you have problems, contact IT security for assistance.
Even after you run Identity Finder, protected information may end up in your temporary files. Symantec PGP encryption makes it difficult for unauthorized persons to view such information if your device is lost or stolen. View the PGP encryption information in the portal, or contact UNH IT security to discuss whether encryption is appropriate for your situation.
A general information security training PowerPoint, as well as l topic-specific presentations are posted in the portal. Live training is provided through the Supervising @ UNH, Getting Started @UNH, October Cyber Security programs, and custom training scheduled with IT security staff. Short and informative videos from SANS are available online. See instructions in the portal for accessing these resources.
Storing university information in systems that lack adequate protection, contracts and security reviews puts you and the institution at risk. UNH uses the vendor contracts security questionnaire posted in the portal to screen prospective providers. USNH purchasing provides advice regarding contract language. Professionally operated data centers at UNH provide key protection mechanisms that are not possible in offices and storage closets. Use these resources and obtain administrative approval prior to storing restricted information in any system. IT security is available to help you screen service providers, and review existing contracts.