Our mission is to provide technology tools and services, education, awareness, and guidance to help the FAMU community appropriately protect the confidentiality, integrity, and availability of computing and information assets.
Our responsibilities include:
In support of our University’s 5-year Strategic Plan specifically, Priority 5: First Class Business Infrastructure Goal 3 Strategies: Train personnel to implement and maintain appropriate internal controls in high-risk areas (p43) FAMU Information Technology Services (ITS) partnered with Cyber Safe Workforce LLC. to provide this year’s annual Cyber Security Awareness Training.
Training Material
Universities across the U.S., including ours, continue to suffer from cyber-attacks. These events have led to outages, identity theft, financial loss, and much more. These losses are not only at times detrimental to the organization but also to the employees whose personal data can be at risk. ITS is taking every measure available to protect our employees’ information, but technology solutions aren’t always enough. Criminals are getting really good at crafting e-mails that look legitimate.
A strong password is key to protecting your personal information and securing your
online interactions and transactions. The strongest passwords are often meaningful,
lengthy, complex, varied, and changed frequently.
Florida A&M advocates for strong passwords by requiring members of the University
community to change their passwords every 90 days. Check out the tips below to learn the dos and don'ts of creating the strongest password
possible.
Devising a Strong Password
When thinking about your potential password, consider:
Dos and Don'ts of Creating a Password
When actually creating your password, keep in mind the following Dos and Don'ts:
Dos
Dont's
Mobile computing devices are devices such as tablets, smart phones, USB devices, and laptop computers. The very features that make these devices useful (portability, access connectivity, data storage, processing power, etc.) also make them a security risk to users and to Florida A&M University (FAMU) when those devices contain university data. Major features of mobile devices that create risk to the user, and potentially the university as well, include their small size (they can easily be lost or stolen), weak user authentication mechanisms that can easily be compromised or simply disabled by the user, and their ease of interconnectedness.
This document explains general end-user security measures that can be taken on mobile devices. Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other threats. Every member of the FAMU community who uses a mobile computing device can make the Maryland computing environment more secure by following these best practices.
General Security - Your department’s IT staff may be able to assist you with the following:
Transmission Security
Application and Data Security
For help, please contact the Security Team of the Information Technology Services Department at phishbowl@famu.edu and/or call the HelpDesk at 850-412-4357.
Phishing is an attempt made by an individual or group to obtain personal information from unsuspecting users by posing as a trusted organization or individual, such as technical support or one’s bank. Commonly, this is done through email messages that are specifically crafted to look similar to actual communications sent by the organization or individual, at times even using real company logos and information. Please forward any possible phishing email messages to phishbowl@famu.edu. You may also call the IT Help Desk at (850) 412-HELP(4357) to speak with a customer service agent about the issue.
What is phishing?
Phishing is an attempt made by an individual or group to obtain personal information from unsuspecting users by posing as a trusted organization or individual, such as technical support or one’s bank. Commonly, this is done through email messages that are specifically crafted to look similar to actual communications sent by the organization or individual, at times even using real company logos and information. Within the email users may be asked directly to provide specific personal information or they may find instructions directing them to a link that they must click on, leading them to a fraudulent website designed to look legitimate. Once on the site the user is often requested to provide personal information, such as usernames and passwords, which can be used to assist with future compromises or lead to identity theft. In some cases these fraudulent sites may contain malicious code meant to infect the user’s computer with a virus or other form of malware.
What to do if you fall victim to phishing or think you are being phished?
Email: Please forward any possible or known phishing email messages to phishbowl@famu.edu.
Phone: You may also call the IT Help Desk at (850) 412-HELP(4357) to speak with a customer service agent about the issue.
How to avoid phishing attacks?
United States Computer Emergency Readiness Team – Avoiding Social Engineering and Phishing Attacks
United States Computer Emergency Readiness Team – Recognizing and Avoiding Email Scams