Security

Secure wiping of Data

It is OIT policy to securely wipe (erase securely) all data on University owned hardware prior to the hardware being retired and removed from campus. OIT provides a few methods to securely wipe data and will assist  you with this at  your request. Boot and Nuke is a utility that OIT runs to securely wipe [...]

, , , , , , , ,

No Comments

Security Best Practices

OIT has integrated industry standard best practices into their computer management.  The following items are just a few best practices; Principle of Least Privileged User Secure passwords Computers joined to Tufts Domain to leverage security policies Customized Operating System installations with unnecessary services disabled Local Firewalls enabled Network Firewalls for sensitive data or research equipment [...]

, , , , , , , ,

No Comments

Spam Filter

Proofpoint Inc. is an anti-spam product that acts as a gatekeeper for UIT’s Trumpeter and Exchange email servers. The product inspects more than 200,000 message attributes and has a high degree of success at detecting spam. Once examined, legitimate messages are routed to the recipient’s mailbox while suspected spam is quarantined by Proofpoint. Proofpoint is automatically enabled [...]

,

No Comments

Patch Management

The School of Medicine provides a Windows Update Service for Windows computers.  The patches include all patches for Windows and other Microsoft products including Microsoft Office (Word, Powerpoint, Excel and Outlook).  All patches are approved for use on a monthly basis, and released on the second Tuesday of every month. Patches for frequently used programs [...]

, , , , , , , ,

No Comments

Digital Millenium Copyright Act (DMCA)

The Digital Millenium Copyright Act (DMCA) criminalizes production and dissemination of technology, devices or services intended to circumvent measures that control access to copyrighted works.  It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. For the Tufts University policy and further information, please review [...]

No Comments

Identity Finder

Identity Finder is a software application licensed by Tufts for on campus and off-campus use.  The software allows users to search computers for sensitive information that should be either protected or destroyed to prevent misuse. If you wish to use Identity Finder on your computer at work, or to obtain a copy for home use, [...]

, , ,

No Comments

End Point Encryption

Whole Disk Encryption is available to faculty and staff who have sensitive information on their laptop. Encryption is a method for keeping information safe in the event that a laptop is lost or stolen.  The encryption client runs in the background and keeps the entire hard drive encrypted, which makes it unreadable by unauthorized parties.  [...]

, , , , , , ,

No Comments

Malware Cleanup

Malware is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.  It includes computer viruses, worms, trojan horses and spyware.  Malware can be avoided by following some commonsense practices such as never opening an email attachment unless you are [...]

No Comments