Information Technology Security
Overview
As an institution of higher learning, North Carolina Central University encourages, supports, protects, and embraces the freedom of expression to pursue scholarly inquiry and share information with the global academic community. To maintain a secure and reliable network, NCCU Information Technology Services (ITS) strives to inform all NCCU employees and students of the policies that govern the use of NCCU computing services and networks and to encourage security awareness and prevention.
The IT Security office promotes and secures information technology systems, services, and programs on our campus. The overall goal of the IT Security office is to provide the following:
- awareness and guidance related to the University’s information asset and technology environment
- proactive security analysis
- risk management and mitigation
- disaster recovery
- phishing interactive training
National Cybersecurity Awareness Month
National Cyber Security Awareness Month (NCSAM), observed every October, was created as a collaborative effort between government and industry to ensure every American has the resources they need to be safer and more secure online.
“Cyber threats pose one of the gravest national security dangers the United States faces.” – President Barack Obama
Resources
Below are some resources that equip you to Protect the Nest and Be a Cyber Eagle.
Info Accordions
Safeguard Your Device: Travel Advice
Information on computers, tablets, and smartphones might be exposed to various threats when traveling. The risks are increased by the increased likelihood of gadget loss or theft as well as the diversions associated with travel. Our gadgets are further put at risk when we use networks that track and intercept network communication for nefarious purposes.
When traveling, users should restrict how much important data they store on their phones. You should steer clear of critical networks, particularly when visiting nations that pose a risk to national security (see the U.S. State Department's Alerts and Warnings).
Getting Ready for the Trip
- Determine "high-risk" nations: To learn more about determining "high-risk" nations you intend to visit, go to the Alerts and Warnings webpage of the U.S. State Department. For comprehensive information, consult the pertinent position papers.
- Recognize the sensitivity of any data: Try to bring as little sensitive information with you as possible when traveling. According to the University's Data and Information Regulation, information deemed sensitive or classified as confidential must be either kept behind or given extra protection. Devices that have extraneous sensitive data removed are less likely to be vulnerable to illegal access.
While Traveling
- Use caution when using public WiFi networks since they can be unsafe. To prevent accessing private information, encrypt your internet connection using a VPN.
- Turn off Bluetooth: Turn off Bluetooth when not in use to avoid tracking or unwanted access.
- Never leave your devices unattended: To avoid theft or tampering, always carry your devices with you. In public areas, never leave your device unattended.
- Avoid public computers. They could be compromised, and you should never access sensitive information or enter your credentials on them.
- Use only reliable accessories: Exercise caution when choosing accessories. Steer clear of unknown USB devices and chargers as they may be infected with malware. Use an AC power outlet instead of a USB charging station to lower the possibility of device compromise or data theft.
- Enable device tracking functionality: To track your devices in the event that they are lost or stolen, turn on features like Find My Device or comparable services.
- Keep an eye on your cellular data use: To avoid excessive fees and guarantee a safe connection, exercise caution when using your cell data.
- Connect to HTTPS websites: To protect your data while it is being transmitted, make sure websites are always using HTTPS.
- Stay away from suspicious links: Steer clear of clicking on dubious links or prompts, as they could direct you to malware or phishing websites.
Should Your Device Be Stolen or Lost
- Report right away: Notify your institution's IT department and the local authorities of the loss or theft.
- Change your passwords: To protect your information, change the passwords for every account you access on the device.
- Monitor your accounts: Keep an eye out for any questionable behavior on your accounts and report it right away.
Following Your Trip
- Change your passwords: To keep your accounts safe when traveling, make sure you change the passwords for every account you access right away.
- Examine your devices: Make sure your travels haven't damaged the integrity of your devices by running a virus scan on them.
iPad and Laptop Loaners from NCCU
NCCU is able to offer a loaner laptop. Standard software and an international power adaptor are preinstalled on the loaner laptop. To acquire a loaner laptop, give ETAC a call at 919-530-7676. Note: Please be aware that teachers and staff are able to use an NCCU loaner laptop.
NCCU-Issued Cell Phones
If you plan to use an NCCU-issued cell phone while traveling, contact the Telecommunications team to find out what the contract already permits and the current policies regarding overseas cell phone use. When using a cell phone abroad, international texting, calling, and roaming data functions must be enabled.
For additional information, call the NCCU Telecommunications team at 919-530-7676.
By taking these precautions, you can keep yourself safe and connected when traveling abroad by protecting your data and electronics.
Phishing is the single greatest threat to individual privacy and cybersecurity. In order to increase awareness of the dangers associated with phishing, the NCCU partnered with KnowBe4 to implement the Phishing Awareness Program in September 2022.
To do this, ITS conducts periodic simulated phishing campaigns using the KnowBe4 platform. This platform uses real phishing email templates, stripped of all malicious content, to provide real-world exposure to the most relevant — and malicious — phishing emails on the web. It’s designed to create a safe, educational environment for a recipient to practice phishing email identification with no penalty to them if a link is clicked.
Our objectives within this program are to:
- Train participants to recognize, report and avoid phishing attacks, which helps protect them and their departments from cyber threats
- Help the Information Technology Security division collect better metrics and information when planning for new technology
- Provide proactive and reactive training that is up-to-date with the most recent phishing trends, equipping users with the resources to identify phishing emails and protect themselves and our community
- Online Security Incident Form (myEOL login required)
- TeamDynamix Knowledge Base Article
- Phone: 919-530-7676 (Helpdesk)
Promptly report violations. If you suspect or witness a security event, report it as soon as possible.
What Is a Security Incident?
A security incident is a compromise of the confidentiality (privacy), integrity, or availability of institutional information or IT resources in material or a reportable way.
Computer Security Incident
A computer security incident is any attempted or successful unauthorized access, disclosure, or misuse of computing systems, data, or networks, including hacking and theft, to a University Information System.
Report anything unusual. If it sets off a warning in your mind, it may be a problem. Don’t ignore it!
- Immediately report suspected security incidents and breaches to your supervisor and Eagle Technical Assistance Center (ETAC). Be sure to indicate whether sensitive information may be at risk.
- If you think that your computer has been compromised or that someone might be accessing your computer remotely, it is best if you unplug the network cable, turn wireless off, and leave the computer on until help arrives.
Phishing is a type of fraud in which an attacker assumes a false identity in order to obtain confidential information (e.g., passwords or credit card numbers). If you're worried an email you received may have been a phishing attempt, check out ITS's Phish Bowl page to see the latest phishing emails reported by our campus.
Not only is practicing computer security the responsibility of the entire campus community, but it is also a skill everyone can and should master. Hackers, identity thieves, scammers, and online criminals are becoming increasingly sophisticated, and individuals need to be equally adept at fending them off.
If you're looking for a person to talk to your group (students, faculty, or staff), please reach out to our security team. They will explain the importance of making sure you keep your information secure and protecting yourself as well as the university from phishing and other security acts that can compromise the integrity of your finances and/or NCCU. Reach out to the team by emailing [email protected] or calling 919-530-7676 today!