Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Protecting your Devices and Resolving Security issues

  • According to the university's Information Security Policies, Lehigh uses two software packages to monitor Lehigh-owned computers for malware and viruses: Malwarebytes AntiMalwarebytes Anti-Malware, and Avast Business Securityand Crowdstsrike security software.  These applications are centrally managed and continuosly updated by the LTS Security team (security@lehigh.edu), and continuously updated.  
  • LAN File Storage servers (which house the H: and I: drives) are automatically scanned for infected files using Symantec AV, with alerts going directly to system administrators.  
  • Phishing - . Google can help minimize the effect of email scams when they're notifiedsuspicious messages are detected.  
    • To report a scam email:  With the questionable message open in Lehigh Gmail, select either...
      • Select the verticalellipsis (three dots) next to the 'Reply' button and choose 'Report Phishing'.
      • Click on the phishhook icon in the righthand column of your inbox.
  • Watch LTS security video training series for help on identifying scams, as well as a host of other security-related topics.
  • If you are a student, the Student Technology and Repair Services (STARS) team provides in-person, onsite, and walk-up help for students, including fixing problems from virus/malware infections, hardware problems, and configuration issues.

Encryption

  • Faculty and Staff computers running Windows are encrypted using Microsoft's BitLocker whole disk encryption technology.  MacOS systems use Apple's FileVault full-disk encryption (FileVault 2).
  • Keys are 'escrowed' by LTS, so that the university can retrieve data if needed.
  • If you see a message on your PC prompting for Recovery Key ID, you'll need a BitLocker recovery key to continue booting your computer.  
  • Note that this encryption has implications for International Travel.

About Backups

  • Regardless of steps taken to protect your device and data, backups are crucial.  Please read LTS's Overview of Backup Options.
  • Lehigh expects that work product files are stored on LAN file servers, which are backed up by LTS. 
  • If you have local files but cannot purchase software, you should at least backup important files using a free tool such as the Apple's Time Machine for macOS, Google Backup and Sync, or 'Backup and Restore' in Windows.

...