Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

...

...

Protecting your

...

Devices and

...

Resolving Security issues

  • According to the university's Information Security Policies, Lehigh uses two software packages to monitor Lehighmonitor Lehigh-owned computers for malware and viruses:   Malwarebytes  AntiAnti-Malware, and Avast Business Security.  These and Crowdstsrike security software.  These applications are centrally managed and continuosly updated by the LTS Security team, and continuously updated.  
  • LAN File Storage servers (which house the H: and I: drives) are automatically scanned for infected files using Symantec AV, with alerts going directly to system administrators.  
  • Phishing - The LTS Security team . Google can help minimize the effect of email scams when they're notifiedsuspicious messages are detected.  
    • To report a scam email:  With the questionable message open in Lehigh Gmail, select either...
      • Select the verticalellipsis (three dots) next to the 'Reply' button and choose 'Report Phishing'.
    Watch the Securing the Human
      • Click on the phishhook icon in the righthand column of your inbox.
  • Watch LTS security video training series for help on identifying scams, as well as a host of other security-related topics.
  • The If you are a student, the Student Technology And and Repair Services (STARS)  team team provides in-person on-site , onsite, and walk-up help for students, including fixing problems from virus/malware infections, hardware problems, and configuration issues.

Encryption

  • Faculty and Staff computers running Windows are encrypted using Microsoft's BitLocker whole disk encryption technology.  MacOS systems use Apple's FileVault full-disk encryption (FileVault 2).
  • Keys are 'escrowed' by LTS, so that the university can retrieve data if needed.
  • If you see a message on your PC prompting for Recovery Key ID, you'll need a bitlocker BitLocker recovery key you to continue booting your computer.  
    • You can contact the LTS Help Desk (we can generate a key for you), 
    • or you can generate your own
    at https://mbam.lehigh.edu/SelfService– you would likely enter this URL on a mobile device or alternate laptop or PC, and enter the key on the disabled device. 

...

About Backups

  • Regardless of steps taken to protect your device and data, backups are crucial.

...

...

  • have local files but cannot purchase software, you should at least backup important files using a free

...

...

...

  • 'Backup and Restore

...

  • ' in Windows.


...


Child pages (Children Display)