Mitigating Threats

The threat posed by global cyber-attacks, especially phishing and ransomware threats, is a serious concern for many organizations. Cybercriminals use phishing emails to induce individuals to reveal personal information, such as passwords and credit card numbers, or to compromise accounts to gain access to systems like Banner and Workday. Ransomware is a unique cyber-attack technique where cybercriminals encrypt data then demand money to release it.

While WPI Information Technology employs strategies and tools which work together to protect against these threats, community members also play a role in protecting WPI data and limiting personal risk. The following best practices are a good starting point.

_________________________________________________________________

Protect Your Login

IT Will Not Ask for Your Password

No one in IT will ever ask for your passwords and you should never provide them. Never share your passwords. Your WPI password should differ from other passwords for personal use.

Secure Passwords

Another way to guard your access is to make sure that your passwords are complex and secure.

Tips for creating a secure password

 

Multi-Factor Authentication (MFA)

WPI uses MFA to ensure that sensitive data stored in the cloud is protected. Please ensure you have setup MFA.

Multi-Factor Authentication

 ________________________________________________________________

Protect Your Data

Data Backup

Crypto and ransomware infections can be catastrophic for users because they encrypt and restrict access to all files on your machine. The best way to combat this type of attack is to make sure that your data is securely and regularly backed up.

Use WPI Storage

If you use IT-managed storage options, such as OneDrive and network file storage services, backup is already done for you!

Get Started with OneDrive

 ________________________________________________________________

Beware of Phishing and Click Wisely

How Phishing Works

Phishing attacks use social engineering to try to steal your credentials or identity. Do not open links or attachments in an email if you are not expecting them - even if you know and trust the sender. Cyber criminals frequently spoof email addresses and web links. Be vigilant. Trust but verify. 

Report Suspicious Activity

Report suspicious emails to phishing@wpi.edu. This will help Information Security to identify current phishing threats targeting the WPI community, so they may take appropriate action.

Report A Phishing Attempt

 ________________________________________________________________

Patch/Update Devices and Reboot Often

WPI Devices

WPI IT-managed computers are protected through regular updates and patches which are rolled out on a regular schedule.

Automatic Updates

Setup personal devices to automatically apply updates and restart devices often.

Check IT News

Watch IT News for information about patches and be attentive to any required actions.

Check IT News

 ________________________________________________________________

Do you suspect your computer is infected?

If you think you may have a virus, malware, or ransomware please call IT immediately at 1-508-831-5888 for further instructions.

Patch/Update Devices and Reboot Often

WPI Devices

WPI ITS-managed computers are protected through regular updates and patches which are rolled out on a regular schedule.

Automatic Updates

Setup devices to automatically apply updates and restart devices often.

Check IT News

Watch IT News for information about patches and be attentive to any required actions.

Check IT News

Do you suspect your computer is infected?

If you think you may have a virus, malware, or ransomware please call ITS immediately at 1-508-831-5888 for further instructions.