Protecting your Devices and Resolving Security issues
- Lehigh uses two software packages to monitor Lehigh-owned computers for malware and viruses: Malwarebytes Anti-Malware, and Avast Business Security. These applications are centrally managed by the LTS Security team, and continuously updated.
- LAN File Storage servers (which house the H: and I: drives) are automatically scanned for infected files using Symantec AV, with alerts going directly to system administrators.
- Phishing - Google can help minimize the effect of email scams when they're notified.
- To report a scam email: With the questionable message open in Lehigh Gmail, select the verticalellipsis (three dots) next to the 'Reply' button and choose 'Report Phishing'.
- Watch the Securing the Human video training series for help on identifying scams, as well as a host of other security-related topics.
- The Student Technology And Repair Services (STARS) team provides in-person, onsite, and walk-up help for students, including fixing problems from virus/malware infections, hardware problems, and configuration issues.
International Travel with Computers and Electronic Devices
Overview
- When traveling outside the United States with your computer, tablet or phone there are certain export control regulations and risks you should be aware of. If your computing device is encrypted you may be in violation of U.S. export law as well as import law of the country you are traveling. Since encryption can be used for illegal activities, some countries severely limit the import of computing devices that are encrypted. This may cause you to be fined or your computer or electronic device to be confiscated.
- If you travel with a computing or electronic device that is not encrypted, and you have sensitive data stored on the computer, a data breach may occur if your computer is stolen. Therefore, special care needs to be taken when traveling internationally with any computing device encrypted or not.
...
- If you don’t need it, don’t take it.
- Consider taking a loaner laptop. Library and Technology Services have a limited number of loaner laptops available. Please contact Student Technology and Repair Servicesto reserve one.
- Decrypt your laptop or computing device and remove any sensitive data (personal and institutional) that is not needed during your trip.
- Leave your sensitive data at home and store it on the H: or I: drive at Lehigh. Use the Lehigh VPN to connect from overseas if needed.
- Make sure your Anti-Virus software is up-to-date along with any Malware programs you have installed.
Encryption
- Faculty and Staff computers running Windows are encrypted using Microsoft's BitLocker whole disk encryption technology. MacOS systems use Apple's FileVault full-disk encryption (FileVault 2).
- Keys are 'escrowed' by LTS, so that the university can retrieve data if needed.
- If you see a message on your PC prompting for Recovery Key ID, you'll need a BitLocker recovery key to continue booting your computer.
- You can contact the LTS Help Desk (we can generate a key for you),
- or you can generate your own at http://www.lehigh.edu/go/bitlockerhelp (typically from a mobile device).
About Backups
- Regardless of steps taken to protect your device and data, backups are crucial. Please read LTS's Overview of Backup Options.
- Lehigh expects that work product files are stored on LAN file servers, which are backed up by LTS.
- For automatic backup of files stored on individual desktop systems, Code42 Crashplan is available and highly recommended for Faculty and Staff.
- If you have local files but cannot purchase software, you should at least backup important files using a free tool such as the Apple's Time Machine for macOS, Google Backup and Sync, or 'Backup and Restore' in Windows.
...