The CaTS Help Desk was recently made aware that yesterday afternoon a large number of Wright State faculty, staff, and students received an email from an Alexa Brown at Retirement Expert with a subject line of ‘Retirement And Pension Meetings for Wright State University Employees’ indicating eligibility to receive a free consultation for retirement benefits. Please be aware that this message originated from a third-party organization that is NOT affiliated with Wright State University.
Security
On this page:
About Security
The goal of the Wright State University IT Security website is to provide information for protecting the University's computing and information resources/data by complying with information-related laws, regulations, policies, and security best practices. We are also concerned with the health of your computer and the protection of your sensitive information.
For your personal protection against malicious internet activity, we encourage you to review the information on this site, specifically the section entitled Do IT Wright, accessible from the menu on the right. You are the only one who can protect your finances, identity, and personal data.
Theft of personal data can occur both at home and at the university workplace, since employees of the university work daily with protected or personal information. If two pieces of information can be put together to provide access to obtain personal documents, security measures must be in place to protect that information. Paying close attention to the information on this website can provide you with valuable insight on how to protect both your information and the University's sensitive data.
The CaTS Help Desk is here to help. If you have questions or concerns about information technology security, please see the Contact Us page.
Policies
- Data Protection Considerations (PDF)
- Data Security Compliance (PDF)
- Incident Response Plan (PDF)
- Information Technology Security Framework (PDF)
- Minimum Standards for Networked Devices (PDF)
- Network Port Extension Policy (PDF)
- Password Management Policy (PDF)
- Security Best Practices - System Administration (PDF)
- Server Registration Procedure (PDF)
- Security Strategy (PDF)
- Two-Factor Authentication Policy and Procedure (PDF)
- Virtual Private Network (VPN) Policy (PDF)
Training
See below for training on information technology security.
Training Documentation
- Introduction to Computer Security (PDF)
- WSU Security Awareness Guide (PDF)
- HIPAA Security Awareness Training (PPTX)
Videos from CaTS
Updates
Notification of Non-University Sponsored Retirement Message
Important Information Regarding 'Email Bombing'
Recently CaTS has noticed an increase in Wright State members who are targets of an IT security incident called 'email bombing'.
What is email bombing?
Email bombing is when an attacker registers your email address with hundreds or thousands of mailing lists.
Why was I targeted for email bombing?