...
...
...
...
...
...
...
...
...
...
Protecting your
...
Devices and
...
Resolving Security issues
- According to the university's Information Security Policies, Lehigh uses two software packages to monitor Lehighmonitor Lehigh-owned computers for malware and viruses: Malwarebytes AntiAnti-Malware, and Avast Business Security. These and Crowdstsrike security software. These applications are centrally managed and continuosly updated by the LTS Security team, and continuously updated.
- LAN File Storage servers (which house the H: and I: drives) are automatically scanned for infected files using Symantec AV, with alerts going directly to system administrators.
- Phishing - The LTS Security team . Google can help minimize the effect of email scams when they're notifiedsuspicious messages are detected. The Student Technology And
- To Report report a Scam Emailscam email: With the questionable message open in Lehigh Gmail, select either...
- Select the verticalellipsis (three dots) next to the 'Reply' button and choose 'Report Phishing'.
- To Report report a Scam Emailscam email: With the questionable message open in Lehigh Gmail, select either...
- Helpful training on identifying scams can be found in the "Securing the Human" video series.
- Click on the phishhook icon in the righthand column of your inbox.
- Watch LTS security video training series for help on identifying scams, as well as a host of other security-related topics.
- If you are a student, the Student Technology and Repair Services (STARS) team team provides in-person on-site , onsite, and walk-up help for students, including fixing problems from virus/malware infections, hardware problems, and configuration issues.
Encryption
- Faculty and Staff computers running Windows are encrypted using Microsoft's BitLocker whole disk encryption technology. MacOS systems use Apple's FileVault full-disk encryption (FileVault 2).
- Keys are 'escrowed' by LTS, so that the university can retrieve data if needed.
- If you see a message on your PC prompting for Recovery Key ID, you'll need a bitlocker BitLocker recovery key you to continue booting your computer.
- You can contact the LTS Help Desk (we can generate a key for you),
- or you can generate your own
...
- at via our Bitlocker self-service page.
- Note that this encryption has implications for International Travel.
About Backups
- Regardless of steps taken to protect your device and data, backups are crucial.
...
- Please read LTS's Overview of Backup Options.
- Lehigh expects that work product files are stored on LAN file servers, which are backed up by LTS.
- If you have local files but cannot purchase software, you should at least backup important files using a free tool such as the Apple's Time Machine for macOS, Google Backup and Sync, or 'Backup and Restore' in Windows.
...
Child pages (Children Display) |
---|