The security of your information is a central priority for technology services. We strive to defend the data that you've entrusted to us against purposeful and accidental unauthorized disclosures, modifications, and losses. We have put in place a set of technical, administrative, and operational controls that work together toward this goal, but the security and privacy of your information also depends on you.
Ten Things You Can Do to Protect Yourself Online
- Learn to recognize phishing attacks.
- Use strong passwords, and different passwords for different accounts.
- Choose security questions for resetting passwords that are not guessable based on public information or social media.
- Protect your email account. It’s not just personal information; it’s the back door into all your other accounts through password resets.
- Set a passcode on your phone. It likely has sensitive data on it, including your contacts’ information and access to your email and social media accounts.
- Be selective with what you share on social media, and talk to your friends about what they share.
- Backup your data. Hard drives fail and computers and phones get lost and stolen. It is unlikely you will avoid this at some point.
- Use two-factor authentication where it’s available, especially on email and banking sites.
- Practice safe computing. Make sure that your operating system and software (including anti- virus) is set to auto-update, and do not leave your computer logged in where it is accessible by others.
- Detect fraud. Regularly monitor your financial accounts and credit reports.
Security Awareness Videos
For tips on how to better protect yourself from online threats and identity theft both at work and at home, please take a look at the training videos Loyola has made available through the SANS Institute’s Securing the Human program. The videos are available to all faculty, staff, and administrators via your Loyola username and password: https://loyola.securingthehuman.org. A great to start are the videos: Senior Leadership, which is a good overview of topics; and Email and IM, which will help you to identify phishing attacks.
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
See an example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy. Also note that although the URL of the bank's webpage appears to be legitimate, the hyperlink would actually be pointed at the phisher's webpage.
Report a Phishing Attempt
If you believe you are the target of an attack (such as SPAM email asking for sensitive information), report it to the Help Center by forwarding the message to firstname.lastname@example.org so we can investigate and share the existence of the threat with others.
ALL technology communications will originate from the office of technology support using the email address: email@example.com. If you receive a message from any other address, including another Loyola address, that is asking for sensitive or trusted information such as credit card or social security numbers, or passwords, this is NOT an official message. If you believe you are the target of a security attack, please contact Client Services for assistance.
Loyola uses Ironport to help block SPAM email messages and harmful messages. See a summary of Ironport reports; new reports are available each month.
Protect Your Emails and Documents
Learn how to protect documents and files via Information Rights Management (IRM).
See Loyola's password requirements and tips for making a strong password.
Loyola requires that all computers, including students’ computers run an anti-virus program with up-to-date definitions. Loyola provides every student with Symantec End-Point Protection, which is a combination anti-virus and anti-malware program. If you currently have an up-to-date anti-virus program and would like to continue using it, please feel free to do so; however, Symantec End-Point Protection is provided to you at no charge.
It is important to remember that only one antivirus program should be running on your machine at any time! If you decide to use Loyola's Symantec End-Point Protection, then you should un-install any other anti-virus applications you may have.
To install a free version of Symantec End-Point Protection for either Mac or PC please visit our downloads page.
Periodically, and upon first use, when you are connected to Loyola's network (wired or Wi-Fi), you will be prompted to install a small security program called SafeConnect. SafeConnect is designed to control access to the residential network. In this manner, no unauthorized computers will be allowed to connect to the network with malicious intentions. To see a demonstration on how to install the SafeConnect Policy Key choose your operating system below.
- Windows Vista
- Windows 7
- Windows 8
Visit our policies section to learn more about information security.