Security Awareness
The Office of Information Security and Privacy (OISP) in the Office of Technology Services (OTS) provides Cybersecurity Awareness resources for Towson University.
Protect yourself and TU
Security Best Practices
- Stay informed with the cybersecurity advisory list (login required), which describes current threats affecting the general population and see examples of recent scams at TU through the Phish Tank.
- Trust your instincts. If something feels suspicious, or too good to be true, it probably is.
- Take your time. Think before responding to urgent requests.
- When in doubt, consult. Talk with your supervisor or contact the Office of Information Security and Privacy through TechHelp.
- Report it. Forward suspicious email to phishing@towson.edu, then delete. If you think your account has been compromised, let us know immediately through TechHelp. Learn more.
Multi-Factor Authentication
Everyone with a NetID uses Duo MFA to protect their TU account. Learn about MFA and using it on your personal accounts in this National Cybersecurity Alliance article.
Getting Duo prompts you didn’t request? These are called MFA Bombing/Fatigue Attacks. Follow these best practices:
- Never approve Duo MFA prompts you didn’t initiate.
- Report repeated, unsolicited MFA notifications immediately through TechHelp.
- If you continue to receive unexpected authentication requests, contact the OTS Tech Support Desk.
Password Security
Cybercriminals have developed sophisticated programs to guess your passwords. To protect yourself, it is important to create a strong password that cannot be easily hacked. Refer to TU's password guidelines when creating a Towson University NetID or other online password.
Phishing
Phishing is a cybercrime targeting your email. Forward suspicious emails received in your TU inbox to phishing@towson.edu. Learn more about different types of phishing, including social engineering and fraudulent job scams - and how to protect yourself and TU on the phishing webpage.
Online Meeting Security
Follow the Webex and Zoom security guidelines, which include including specifics for hosting meetings, and settings to consider before, when scheduling, and during meetings.
Confidential/sensitive online meetings:
- Follow the above security guidelines.
- Be extra diligent about protecting TU confidential data.
- Understand TU's definition and classifications of confidential data.
- Ensure the meeting is password protected, which requires participants to enter a password to join.
- Confirm meeting topics or calendar invites do not include any sensitive information.
- Make sure sensitive meetings are not recorded. Instructional meetings may be recorded with prior consent.
Security Checks
Use these resources and tips from the National Cybersecurity Alliance to better secure your online accounts and digital devices and keep your data safe.