Posts Tagged security

Juniper Network Connect

Juniper Network Connect is the Tufts VPN client and it can be installed via http://vpn.tufts.edu. Once you log on to web VPN (http://vpn.tufts.edu), scroll down to the bottom of the page and click on “Network Connect” under client application session.  Once you click “start”, it will install the client on your machine (Windows or Mac) [...]

, , , , , , , , , , , ,

No Comments

Can I use Skype?

Yes, Skype is allowed by OIT on Tufts managed computers.  Skype is a peer to peer technology and when installed incorrectly, it may impact computer performance or hinder the Tufts network. Please contact OIT if you would like to have it installed, or if you have questions about how best to configure it in the [...]

, , , , , ,

No Comments

Identity Finder FAQ

What is Identity Finder? Identity Finder is a software suite that can help locate sensitive information such as credit card or social security numbers that is stored on computer hard drives or on networked storage. Why do I need to use Identity Finder to scan my computer? On March 1, 2010 Massachusetts regulations went into [...]

, , , , ,

No Comments

Critical hole in Windows (3/13/2012)

Critical hole in Windows Remote Desktop   Microsoft has patched a critical hole in all supported versions of Windows that allows attackers to take control of computers using malicious code.  The vulnerability in the Remote Desktop Protocol may be exploited by a worm-like attack that spreads with no user interaction required. The patch was made [...]

, , , , , , , , , , ,

No Comments

Guard IT

Tufts has compiled helpful information that will help you think, work & act Securely The Guard IT site http://go.tufts.edu/guardit has links to security policies, Data privacy information, sensitive information scanning, and data encryption tools.

, , , , , , ,

No Comments

Physical Computer Security

OIT recommends securely locking your computer to your workspace. Kensington makes simple security cables that are good computers that are left alone for minutes at a time. For computers in highly public locations, we recommend advanced security cables that cannot be cut with power tools.  Cable and lock sets with master key capabilities are available [...]

, , ,

No Comments

VPN

Tufts University has implemented a Virtual Private Network (VPN) to allow for safe and easy access to Tufts resources from off-campus. The tool is a Juniper VPN, which is accessible via the following link: https://vpn.tufts.edu Upon successful log in, the P: drive will be already mapped but other drives will need to be mapped manually [...]

, , , , , , , , , , ,

No Comments

Firewalls

Tufts University has implemented firewalls to  protect key computing areas, including servers and research equipment. If you feel that you have a resource that should be protected by a firewall, please contact OIT to request access.

, , ,

No Comments

Security Best Practices

OIT has integrated industry standard best practices into their computer management.  The following items are just a few best practices; Principle of Least Privileged User Secure passwords Computers joined to Tufts Domain to leverage security policies Customized Operating System installations with unnecessary services disabled Local Firewalls enabled Network Firewalls for sensitive data or research equipment [...]

, , , , , , , ,

No Comments