Services that provide security, data integrity, and compliance for institutional activities. Includes identity and access management, security consulting and educations, incident response and investigation, and security policy and compliance.

Articles (16)

CyberSecurity Education

Technology alone can't always protect our computers and information. Being aware of information security issues and following best practices are the surest way to protect yourself, your family and the Framingham State community.

Data Privacy Tips for Individuals

Information about you, such as your purchase history or location, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites

FSU Alert Account Creation and Editing

This article will teach you how to set up or edit an account that is attached to the FSU alert system.

Guide to Digital Privacy

Sometimes the easiest way for bad actors to gain information on someone it to do some simple searching and get it from their own digital presence. People often give away valuable information in routine posts or discussions. This guide will highlight some of the more common avenues bad actors take to gather this information and steps you can take to avoid them.

Guide to Safe Computing

Tips and tricks for keeping your devices and information safe from malicious attacks.

Guide to Securing Your Spaces

Securing your physical spaces is incredibly important as it can be an easy to way for a bad actor to gain access to secure information. This guide provides tips and tricks to help prevent information from being harvested for a workspace.

Job and Internships Scams

When evaluating potential employment, you must be careful to avoid scams and fraudulent postings. While Framingham State University makes every attempt to block them, scammers constantly find new ways to bypass the system. Learn more about employment scams and how to be vigilant.

Multi-Factor Authentication Phishing Scams

As organizations move to make their accounts and infrastructure more secure, scammers and bad actors are working to make their attacks more sophisticated. Recently we have begun to see an influx of new phishing scams, trying to get people to scan QR codes that lead to malicious content.

Phishing Alert Button (PAB)

The "Phishing Alert Button" (PAB) is a button located within Microsoft Outlook our the https://mail.office365.com webmail that allows users to easily submit reports to ITS of suspected phishing or spam messages.

Phishing Awareness and What to Do if You Fall Victim

Phishing is most common type of cyber-attack in Education, responsible for more than 90 percent of security breaches. No cybersecurity solution can block 100 percent of attacks. Learn more about phishing attacks, and what to do if you become a victim of one.

Ransomware

Ransomware is a type of malicious software (a.k.a malware) that locks the victim out of their computer or files – often by encrypting them – until a ransom is paid. Learn more about ransomware and how to protect yourself

Safety Tips for AI/Chatbot Use

AI/Chatbots offer many tools that can make tasks much easier. However with any new technology there are risks and the opportunity for malicious actors to utilize these tools for their own goals. These tips will help provide some security guidance when using AI/Chatbot technologies.

Strong Passwords at Framingham State University

The creation and maintenance of strong passwords is the first line of defense to keep your user accounts secure. This article will provide guidance and details on FSU's password requirements and recommendations.

Texting (SMS) Scams (SMISHING)

Phishing attacks via text message (SMS) or smishing is a newer form of scam that attempts to gain information or action from someone in real time.

USB Flash Drive Safety Tips

USB is the most common type of connector on devices today. However this standard provides bad actors with the ability to possibly compromise your devices. These tips are provided to help educate everyone on how to avoid risks associated with USB ports and devices.

Working Securely from a Remote Location

University data stored on a computer you use remotely, whether the computer is owned by you or the university, is subject to the same policies as data located on campus. Per University policy, you are the custodian responsible for all University data on any computer you use.