{"id":21680,"date":"2021-11-03T16:21:21","date_gmt":"2021-11-03T20:21:21","guid":{"rendered":"http:\/\/www.montclair.edu\/information-technology\/?page_id=21680"},"modified":"2022-08-10T10:38:53","modified_gmt":"2022-08-10T14:38:53","slug":"security-guidance-for-flexible-working","status":"publish","type":"page","link":"https:\/\/www.montclair.edu\/information-technology\/security-guidance-for-flexible-working\/","title":{"rendered":"Security Guidance for Flexible Working"},"content":{"rendered":"
As the University transitions to a hybrid work model of both on-campus and remote work, it is important to minimize any risk to University and personal information. This document recaps and consolidates guidance and tips for safe computing, generally extracted from our established MSU computing policies.<\/span><\/p>\n We strongly recommend that employees who have a desktop or laptop issued and managed by the University\u00a0should\u00a0use that machine for all business and education-related activities, whether working remotely or while on campus. These machines are centrally managed by IT and\/or your college\u2019s local technology team and are configured with additional security settings that may not be present on a personally owned or personally configured machine. \u00a0Employees should avoid sharing their University-issued computer with family members or using it for non-work related activities like casual web browsing, streaming entertainment, online shopping, etc. as those activities can increase the risk of exposure to malware.<\/p>\n Employees\u00a0must<\/span>\u00a0<\/strong>report the misplacement, theft, or loss of a University-issued device (or any device that has been used to store University related information) to their local police station (or University campus police if the loss occurs on campus),\u00a0their direct supervisor, and the IT Service Desk (or your college\u2019s local technology team) as soon as possible. Please also provide the issued police report when you receive it.<\/span><\/p>\n We also strongly recommend that use\u00a0of\u00a0personally acquired\/managed computing devices (including personally managed computers acquired with University grant or startup funds) and public machines (such as a shared library workstation) for work-related duties be limited\u00a0to:<\/span><\/p>\n a. Accessing your University email account<\/span><\/p>\n b. Browsing the public web\/internet<\/span><\/p>\n c. Accessing campus applications (NEST, Banner, etc.) and approved Cloud services d. Developing educational materials or performing research that do not involve sensitive You are accountable for following the guidelines below whether using University-managed or personal computing devices for work-related purposes.<\/span><\/p>\n a. To minimize risk of data loss or compromise due to hardware failures or security exposures, avoid retaining data\u00a0on the device\u2019s internal storage (C: drive). Instead, store University data on the MSUFiles file server or Google Drive. If you have temporarily copied files from a central storage location (e.g. MSUFiles), please delete them from the device\u2019s internal storage when you are finished working with them.<\/span><\/p>\n b. Log out of the client device when not actively using it.<\/span><\/p>\n c. Explicitly\u00a0put a laptop into sleep\/shutdown mode when not actively being used (that is, do not just close the laptop cover) to ensure full Windows Bitlocker or MacOS FileVault encryption protection.<\/span><\/p>\n d. Do not leave a running laptop unattended outside of private and secure work spaces.<\/span><\/p>\n e. Perform a full reboot of the client device at least once every few days to ensure that security, operating system and other application updates are applied regularly.<\/span><\/p>\n a. Apply all updates when prompted by the system as they are distributed via the University\u2019s device management system.<\/span><\/p>\n b. If granted a local administrative access exception, do not install non-work related applications, plug-ins, or other software.<\/p>\n a. Make sure your computer is kept up-to-date with all operating system and software patches, applied weekly or more frequently.<\/span><\/p>\n b. Do not access sensitive data using personal computers that cannot be updated with the latest patches and\/or are not\u00a0running the latest supported operating system.<\/span><\/p>\n c. Always use antivirus software and check that it is running and actively updating. If you do not have anti-virus software, you can download Sophos Antivirus by logging into the MSU Software Repositor<\/a><\/span>y<\/a><\/span>.<\/span><\/p>\n d. Do not store any sensitive University data on your device. \u00a0Instead access it through Google Drive and\/or MSUFiles<\/a><\/span>\u00a0(including Shared O: and N: Drives).\u00a0<\/span><\/p>\n e. Do not<\/span>\u00a0use your NetID password as the login to\u00a0your personal computer\u00a0<\/span>or for any other personal online account logins. This can help to protect your NetID account if your personal computer is compromised by malware or other security issues.<\/span><\/p>\n Whether using a University-issued or personal phone\/tablet, for the protection of University data as well as your own data (i.e. contact lists, calendars, photos, texts, etc.), enable screen-lock on the device using either a PIN or biometric (face or fingerprint recognition) feature. \u00a0Also, regularly update the device to the latest version of the operating system to ensure patching of any known security vulnerabilities.<\/span><\/p>\n Avoid\u00a0accessing\u00a0sensitive data from mobile devices and\/or tablets that have not been updated to the latest operating system.<\/span><\/p>\n If there is a need to share files that contain sensitive information with other MSU employees, do not use unencrypted email. Instead use the MSU File Hawk<\/span><\/strong>\u00a0secure document distribution system found at:<\/span><\/p>\n \u00a0https:\/\/msufilehawk.montclair.edu<\/a><\/span>\u00a0<\/span><\/p>\n An overview of how to send sensitive information can be found on the MSU File Hawk<\/a> website.<\/p>\n Alternatively, you may securely email sensitive information by moving it to an encrypted attachment, e.g. using Microsoft Office documents or Adobe Acrobat encryption capabilities, and then communicating the password by any other means or at least by separate email. \u00a0An overview of this process can be found in our How to Password Protect and Encrypt a File<\/a> document.<\/p>\n Always store sensitive information on\u00a0on the MSU-managed central file server known as MSUFiles (including Shared O: and N: drives)<\/span>\u00a0or on an approved cloud service like MSU\u2019s Google Workspace (i.e. Google Drive) when appropriate. Google Drive may be used to store most work-related documents with the exception of highly sensitive information classified as \u201cPrivate\u201d, such as social security numbers or health information (refer to the\u00a0Data Classification and Use Policy for full list). \u00a0\u201cPrivate\u201d information should be stored on MSUFiles.<\/p>\n To access an application remotely that is restricted to only on-campus use (such as MSUFiles, Call Center soft phones, some Banner\/NEST functions, and reporting tools like COGNOS and Tableau), you must first connect to the campus network through the VPN service. You can connect to the campus VPN \u00a0by launching the \u201cCisco AnyConnect\u201d VPN application on your university-managed device and logging in with your NetID and password.\u00a0You will also need to use DUO multi-factor authentication when logging into the VPN by typing the word \u201cpush\u201d into the 2nd password field of the AnyConnect client application.\u00a0 See the following VPN user guide for more information:<\/span><\/p>\nClient Workstation Use<\/span><\/h2>\n
When should I use University-issued versus personal workstations?<\/span><\/h3>\n
\n(Google Calendar, Google Drive, Canvas, Workday, Zoom, etc.) with your NetID<\/span><\/p>\n
\nUniversity data<\/span><\/p>\nClient Security Tips<\/span><\/h2>\n
Workstations\u00a0<\/span>\u00a0(e.g.\u00a0<\/span>laptops<\/span>\u00a0and desktops)<\/span><\/h3>\n
\n
\n
\n
Mobile devices (e.g. smartphones, tablets)<\/span><\/h2>\n
Data handling<\/span><\/h2>\n
Remote network access<\/span><\/h2>\n
\n
VPN: Remote access to applications restricted to on-campus access<\/span><\/h2>\n