Wheaton College Color Logo

New and Changing: Updates from AIT

Posted April 26, 2018 by Academic and Institutional Technology
Tags: Security

You’re the Key to Keeping Data Secure

As of October 1, 2017, Wheaton College officially adopted a reviewed and refined version of our Technology Acceptable Use Policy. The purpose of the Technology Acceptable Use Policy is to clearly establish Wheaton College’s position relating to the acceptable use of its technology and your responsibility to protect our information resources. We’d like to highlight an important aspect of the policy that may need your attention. 

In today’s unpredictable environment, filled with rapidly evolving cyber threats and advanced technologies, the best defense against cyberattacks at Wheaton College is you – our employees! You are constantly the target of cybercriminals, and it’s up to you to think twice about keeping data secure. 

Wheaton College’s firewalls are able to prevent many of these attacks, but not all threats can be detected by automated tools alone. Security is up to each and every one of us, and we all have a responsibility to protect ourselves against cyberthreats. One of the most common threats to Wheaton College are phishing emails, which are scam emails that pose as legitimate people or organizations.

When you see a suspicious email, remember to do these three things:

  1. Stop and think
  2. Hover your mouse pointer over the link to check its legitimacy
  3. Forward the message to the AIT Service Desk

Additional security measures you can take to protect data are:

If you have any questions about cybersecurity, visit the AIT Website or contact the AIT Service Desk by email or by phone at 630.752.4357 (HELP).