The Necessity of Anti-Virus Protection in an Insecure Digital World
In the rapidly evolving digital landscape, the threat to personal data due to sophisticated malware is substantial. Advanced threats such as viruses, worms, trojan horses, and ransomware necessitate robust anti-virus protection. Keeping anti-virus software up-to-date is crucial for safeguarding personal information and ensuring the integrity and performance of devices connected to the internet.
Signs of a Possible Infection
If Your System Has a Virus
Multi-Factor Authentication (MFA) is crucial for cybersecurity. It adds extra layers of security beyond passwords, reducing the risk of unauthorized access and protecting against phishing and credential stuffing attacks. MFA is easy to implement, complies with regulations, and enhances overall account security.
One of the best yet most often mishandled security defenses is the password. Keeping your password private and regularly updating it is crucial due to the increasing sophistication of password theft technology. Never share your password with anyone, as it is a vital aspect of your digital security.
Your Password is Your Responsibility
All accounts, passwords, and authorization methods (e.g., NKU keys, access cards) are the user's responsibility and must not be shared. If someone needs access to NKU systems, they must obtain their own credentials through proper channels.
When an employee leaves or transfers, HR and OIT must be notified immediately to protect NKU systems and data. The employee’s accounts will be disabled according to OIT protocols.
Reminder: Never share your password through email or any other electronic means. NKU or any legitimate business will never request your password this way.
Password Tips
Important Selection Tips
There has been a surge in phishing attempts targeting universities, including Northern Kentucky University's students, faculty, and staff. These phishing emails aim to deceive recipients into divulging private information. Phishers often use details from our directory, like campus usernames and passwords, to make their requests seem legitimate. They may ask for responses via email or prompt users to click on links within the email.
Key Reminders:
How to Proceed:
If you're uncertain about an email's authenticity after reviewing this information, forward the email to us at abuse@nku.edu.
For urgent matters, contact the IT Help Desk at 859-572-6911.
Information security policies are crucial for protecting sensitive data, ensuring regulatory compliance, managing risks, and maintaining consistent security practices across the university. These policies are vital for maintaining the security and integrity of our information systems.
*under "Information Technology"
To manage information security risks effectively, it is essential that any identified risks are formally documented and acknowledged. This process involves completing a Risk Acceptance Form, which must then be reviewed and signed by the Vice President or Dean. After this initial approval, the form needs to be submitted to the Information Security Team for final review and approval. This ensures that all security risks are properly evaluated and that the appropriate level of authority has accepted the responsibility for these risks. This thorough documentation and approval process helps maintain the integrity and security of our information systems.
Unsolicited commercial email, or spam, is an increasing problem at the university. All incoming emails are scanned for spam content, and suspicious emails are quarantined.
Quarantine Notifications
Every few days, you will receive an email from quarantine@messaging.microsoft.com listing recently blocked messages.
Spoofing
If an email in your quarantine appears to be sent from your address, it is likely "spoofing" and not a sign of a compromised account. It is a trick to get you to open a spam email.
Forwarding Spam/Phishing Emails
Forward malicious emails to abuse@nku.edu for investigation.