Security Awareness

The following information is critical to the security of everyone especially University data and personal security. Much of the information on this page comes from CUNY Central's security link at https://security.cuny.edu where there is additional and current data on the importance of being security aware when dealing with computing in general.

What Do I Need To Know?

The following PDF explains much of what you need to be aware of when it comes to security awareness on campus and off. Please review and follow up by going to the CUNY Central website at https://security.cuny.edu for the most current details on security awareness.

Read More…

Helpful Tips on Security Awareness

The attached PDF has helpful tips for safeguarding against cyber attacks and helping you become more aware of what to do in order to minimize and or avoid compromising your personal or professional data.

Read More…

90 Day CUNY Central Password Policy Support

As you may be aware of there is a 90 password policy on all systems that require authentication for access. Since the policy was instituted York has attempted to make the process easier by implementing a self service approach to password resets and changes. The attached PDF covers the steps involved in changing your password as well as completing your challenge questions for future changes.

Read More…

"Lock It When You Leave It"

"Lock It When You Leave It"

When you walk away from your computing device if it does not already have a self locking profile you should always, "Lock It When You Leave It" in order to avoid unauthorized access to your data.

Read More…

All About Encyption

The following section is all about encyption and how it affects you if you are storing University non-public data on your local PC or removable devices

Read More…

Non-Public University Data Security

The link here is to our yearly reminder for everyone regarding compliance with the Chancellor's office and the University CIO regarding any system, reports and business processes that contain and /or use non-public University information.

Read More…

Using Caution with Email Attachments & Links

While email attachments are a popular and common way to send and receive documents, they are also a common source of viruses and spam. While our ProofPoint appliance blocks most spam in email, and our virus detection software will screen most malicious attacks caution should still be used when opening attachments, even if they appear to have been sent by someone you know. This PDF from the US-CERT department outlines general guildlines that are part of best practices when it comes to security awareness with email attachments.

Read More…

Document Actions