Security Awareness

The Office of Information Security and Privacy (OISP) in the Office of Technology Services (OTS) provides Cybersecurity Awareness resources for Towson University.

Protect yourself and TU

Security Best Practices

  • Stay informed with the cybersecurity advisory list(login required), which describes current threats affecting the general population and see examples of recent scams at TU through the Phish Tank
  • Trust your instincts. If something feels suspicious, or too good to be true, it probably is. 
  • Take your time. Think before responding to urgent requests. 
  • When in doubt, consult. Talk with your supervisor or contact the Office of Information Security and Privacy through TechHelp
  • Report it. Forward suspicious email to , then delete. If you think your account has been compromised, let us know immediately through TechHelp. Learn more

Multi-Factor Authentication

Everyone with a NetID uses Duo MFA to protect their TU account. Learn about MFA and using it on your personal accounts in this National Cybersecurity Alliance article. 

Getting Duo prompts you didn’t request? These are called MFA Bombing/Fatigue Attacks. Follow these best practices: 

  • Never approve Duo MFA prompts you didn’t initiate. 
  • Report repeated, unsolicited MFA notifications immediately through TechHelp
  • If you continue to receive unexpected authentication requests, contact the OTS Tech Support Desk. 

Password Security

Cybercriminals have developed sophisticated programs to guess your passwords. To protect yourself, it is important to create a strong password that cannot be easily hacked. Refer to TU's password guidelines when creating a Towson University NetID or other online password.

Phishing

Phishing is a cybercrime targeting your email. Forward suspicious emails received in your TU inbox to . Learn more about different types of phishing, including social engineering and fraudulent job scams - and how to protect yourself and TU on the phishing webpage.

Online Meeting Security

Follow the Webex and Zoom security guidelines, which include including specifics for hosting meetings, and settings to consider before, when scheduling, and during meetings.

Confidential/sensitive online meetings:

  • Follow the above security guidelines. 
  • Be extra diligent about protecting TU confidential data.
  • Understand TU's definition and classifications of confidential data.  
  • Ensure the meeting is password protected, which requires participants to enter a password to join.
  • Confirm meeting topics or calendar invites do not include any sensitive information.
  • Make sure sensitive meetings are not recorded. Instructional meetings may be recorded with prior consent. 

Security Checks

Use these resources and tips from the National Cybersecurity Alliance to better secure your online accounts and digital devices and keep your data safe.