Security

Physical Computer Security

OIT recommends securely locking your computer to your workspace. Kensington makes simple security cables that are good computers that are left alone for minutes at a time. For computers in highly public locations, we recommend advanced security cables that cannot be cut with power tools.  Cable and lock sets with master key capabilities are available […]

, , ,

No Comments

VPN

Tufts University has implemented a Virtual Private Network (VPN) to allow for safe and easy access to Tufts resources from off-campus. The tool is a Juniper VPN, which is accessible via the following link: https://vpn.tufts.edu Upon successful log in, the P: drive will be already mapped but other drives will need to be mapped manually […]

, , , , , , , , , , ,

No Comments

Firewalls

Tufts University has implemented firewalls to  protect key computing areas, including servers and research equipment. If you feel that you have a resource that should be protected by a firewall, please contact OIT to request access.

, , ,

No Comments

Secure wiping of Data

It is OIT policy to securely wipe (erase securely) all data on University owned hardware prior to the hardware being retired and removed from campus. OIT provides a few methods to securely wipe data and will assist  you with this at  your request. Boot and Nuke is a utility that OIT runs to securely wipe […]

, , , , , , , ,

No Comments

Security Best Practices

OIT has integrated industry standard best practices into their computer management.  The following items are just a few best practices; Principle of Least Privileged User Secure passwords Computers joined to Tufts Domain to leverage security policies Customized Operating System installations with unnecessary services disabled Local Firewalls enabled Network Firewalls for sensitive data or research equipment […]

, , , , , , , ,

No Comments

Spam Filter

Proofpoint Inc. is an anti-spam product that acts as a gatekeeper for UIT’s Trumpeter and Exchange email servers. The product inspects more than 200,000 message attributes and has a high degree of success at detecting spam. Once examined, legitimate messages are routed to the recipient’s mailbox while suspected spam is quarantined by Proofpoint. Proofpoint is automatically enabled […]

,

No Comments

Patch Management

The School of Medicine provides a Windows Update Service for Windows computers.  The patches include all patches for Windows and other Microsoft products including Microsoft Office (Word, Powerpoint, Excel and Outlook).  All patches are approved for use on a monthly basis, and released on the second Tuesday of every month. Patches for frequently used programs […]

, , , , , , , ,

No Comments

Digital Millenium Copyright Act (DMCA)

The Digital Millenium Copyright Act (DMCA) criminalizes production and dissemination of technology, devices or services intended to circumvent measures that control access to copyrighted works.  It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. For the Tufts University policy and further information, please review […]

No Comments

Identity Finder

Identity Finder is a software application licensed by Tufts for on campus and off-campus use.  The software allows users to search computers for sensitive information that should be either protected or destroyed to prevent misuse. If you wish to use Identity Finder on your computer at work, or to obtain a copy for home use, […]

, , ,

No Comments

End Point Encryption

Whole Disk Encryption is available to faculty and staff who have sensitive information on their laptop. Encryption is a method for keeping information safe in the event that a laptop is lost or stolen.  The encryption client runs in the background and keeps the entire hard drive encrypted, which makes it unreadable by unauthorized parties.  […]

, , , , , , ,

No Comments

Malware Cleanup

Malware is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.  It includes computer viruses, worms, trojan horses and spyware.  Malware can be avoided by following some commonsense practices such as never opening an email attachment unless you are […]

No Comments