Information Security

Multifactor Authentication (MFA), Duo, Spam / Phishing, Spyware / Malware, Rave

Articles (17)

Antivirus Software

UTech offers help with antivirus protection.

As part of the Acceptable Use Policy, all machines accessing the CWRU Network must have antivirus software installed and running.

CWRU Ready

Case Western Reserve University partners with Kuali Foundation, Inc. to provide business continuity planning software to the university community. Known as CWRU Ready, this web-based software is designed to help campus departments create plans for continuity of operations in the event of a disaster or emergency situation.

CWRU Ready - Critical Functions and other items

CWRU Ready is the business continuity planning solution on campus. This article highlights critical functions and other items.

CWRU Ready - Key Resources and Manage Plans

This article highlights key resources in CWRU Ready as well as how to manage plans.

CWRU Ready - Plans and Action Items

This article highlights building plans and action items in CWRU Ready.

Data and Device Destruction

When removing a computer from service, the current procedure is to follow the steps listed on Information Security’s Media Sanitization Procedure page.

Duo Security - Blank Screen or empty DUO prompt on iOS or macOS

If you are using macOS or iOS devices and blank screen is displayed instead of DUO Prompt choices, it means your Content Restriction is blocked the DUO prompt content. Disabling content restriction should resolve the issue.

Duo Security - Enrolling Devices

This article highlights how to enroll an Authentication Device in DUO Security.

Duo Security (Two Factor Authentication)

Two-factor authentication is available for active faculty, staff and students at Single Sign-on, and is required for a variety of systems including Human Capital Management (HCM), Financials (FIN) and Virtual Private Network (VPN) system log-ins.

Two-factor authentication enhances the security of your account by using a secondary device to verify your identity. This prevents anyone but you from accessing your account, even if they know your password.

Identifying Phishing Attempts

Phishing is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Phishing and Spam

Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank, eBay, etc.). These messages urge you either to reply with your user name and password or to click on a hyperlink that takes you to a bogus website where you are asked to input private information (e.g., password, credit card, or other account updates).

Phishing Emails

Phishing is a common email-based attack used by cyber criminals to steal information from you. A phishing email pretends to be from someone or something you know or trust, such as your bank or your favorite online store, then tries to entice you into taking an action, such as clicking on a link, opening an attachment, or responding to a message.

Policies and Compliance

CWRU has an overall UTech policy management process that is the driving factor for information technology usage and management. The policy implementation is performed in conjunction with other areas of the University.

Rave

Rave is a text and voice messaging alert system that is used only in the case of imminent danger or a serious threat to the campus community. Rave is also used to notify the CWRU community of campus closings due to severe weather. In case of a major campus emergency, Case Western Reserve University will utilize the Rave text and voice messaging alert system, among other methods of communicating with faculty, staff and students.

Restricted Information

The types of information listed below are examples of Restricted Information, which is confidential, and if disclosed, has the highest impact on in the university. Use of Restricted Information carries the burden of extensive management controls, known as Tier III Controls, to protect the confidentiality of the information, the information systems that contain it, and the data storage mechanisms where it is stored. By definition, this level of information is not to be shared without proper agree

Security Awareness

Securing your computer is an important step in preventing intruders from stealing valuable information stored there such as credit card and bank information as well as ID and passphrase data. In addition, some thieves can also access your computer's resources such as hard disk space, your processor and your Internet connection.

Stolen Computer

In the event a computer is lost or stolen at CWRU, it is important to first contact Campus Police at 216.368.3333. They will assist the owner in filing a police report and in attempting to locate the stolen device.