Information security guides for students, faculty and staff, and visitors are below:

Students

Information security incidents are events that give someone access to sensitive information (personally identifiable details, passwords, academic, health, or financial records) without permission.

If you suspect a security incident has occurred, immediately contact technical support staff, the Graduate Center IT Services at 212-817-7300.

Please ALSO REPORT the incident yourself, using one of the following methods:

As you progress with your studies, cybersecurity is probably the last thing on your mind. But as a University student, you’re a prime target for hackers. A clean credit report, constant internet connection, and multiple social media channels are lucrative opportunities for cyberthieves.

Using acceptable cybersecurity practices, you can spend more time being a student and less time contacting IT Services. You’re responsible for your online security, so here are some tips to help you protect your data, identity, and finances on and off-campus:

  • Frequently check your bank account.
  • Protect yourself when shopping on secure websites.
  • Avoid using the same password for your social media, school account, and online banking.
  • Be cautious to whom you provide your personal information.
  • Limit risky behavior like oversharing personal information online.
  • Ensure your software and applications are up to date.
  • Use a public computers safely.
  • Resist the temptation to download pirated content.
  • Never send sensitive information like passwords over public Wi-Fi.

Phishing emails are one of the most common online threats, so it is important to be aware of the tell-tale signs and know what to do when you encounter them. Security awareness is the best way to keep yourself safe. 

Recognize and avoid phishers with the following tips:

  • Smishing – phishing via text by following a malware link in a text message.
  • Do not click on a deceptive link or reply to a false email.
  • Do not answer suspicious calls.
  • Do not open unknown attachments in your email.

The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to federal, state, local, tribal, and territorial government employees, federal contractors, and US military veterans.

CiviliNation is a nonprofit working to fight online harassment, character assassination, and violence. The organization believes in defending free speech and fostering an online culture in which individuals can fully engage and contribute without being targeted by abuse, harassment, or lies. Their website offers an extensive library of informative content and a resource center.

The National Cybersecurity Alliance aims to empower a more secure, interconnected world through education and amplification of cybersecurity awareness. NCSA’s website offers resources for online safety, identity theft, account and device security, and privacy management. The site also refers visitors to more than a dozen free security checkups and tools.

Faculty and Staff

Information security incidents are events that give someone access to sensitive information (personally identifiable details, passwords, academic, health, or financial records) without permission.

If you suspect a security incident has occurred, immediately contact technical support staff, the Graduate Center IT Services at 212-817-7300.

Please ALSO REPORT the incident yourself, using one of the following methods:

Cybersecurity is everyone’s responsibility. In a world where the cyberthreat landscape continues overgrowing in size and sophistication, the critical message is to follow the best practice for individuals working from home and stay protected. Working from home does not mean you are any less targeted by cyber criminals. It is still critical that one takes security measures seriously to protect physical and digital assets in your home office. Below are tips you can use to make your home office more cyber secure.

CUNY provides Information Security Guidelines for Working Remotely.

CUNY provides information on Trojan emails, how it works, how to determine if you received a Trojan email, and how you can avoid becoming a victim.

To find out what to do when your email has been hacked, view this video from the Federal Trade Commission.

Staying Safe Online

Learn the basics of cybersecurity with this Stay Safe Online Cybersecurity Video

  • Only download content from web pages that you trust.
  • Stop and Think before you enter your credentials on a website. Do not re-use same password on multiple websites. 
  • Practice safe browsing. Keep your privacy settings on. Make sure you know the page you land on.

The Federal Virtual Training Environment (FedVTE) provides online cybersecurity training to federal, state, local, tribal, and territorial government employees, federal contractors, and US military veterans. Free registration is available for new users.

Visitors

The Graduate Center IT provides support for the wireless network throughout the GC campus. Device configuration is possible without IT Service support. This network is intended to accommodate visitors with non-university-owned computers who wish to access the Internet.

The Federal Trade Commission provides tips on how to safely use public Wi-Fi networks.

For guests who need access to the GC campus wireless networks, there are two options:

  1. Wireless Access for GC Community

Faculty, staff, and students may access GC Community Wireless while at GC premises. To connect to GC Community Wireless, choose the “GCcommunity” network in your device’s wireless settings. When you click on GCcommunity, a pop-up screen will display, requiring GC userID and password. EAP method is PEAP, and the CA certificate should be set to “Don’t Validate.” Enter your GC network account credentials and click on connect. The GCcommunity wireless network is secured and encrypted. Students, faculty, and staff are strongly encouraged to use this network.

  1. Wireless Access for Visitors and Guests

You can set up a guest wireless account by following the process in this GC Information Technology FAQ.

Features

  • Open, unencrypted guest network.
  • Wireless access anywhere on GC’s premises.
  • No GC userID or password is required.

Getting Started

To connect to GC Guest Wireless, choose the “GCguest” network in your device’s wireless settings. Open the web browser on your device where a term of the service agreement will open. After you enter your email address and acknowledge GC’s TOS by clicking on “I Accept,” you will be presented with a successful connection confirmation screen.

Data Security

GC IT recommends the following steps to protect your data while on any wireless network:

  • Visiting only secure Web pages—those whose URLs begin with HTTPS://
  • Encrypting any confidential or sensitive information

Support

If you need assistance with your connection to GC’s Guest Wireless or GC Community Wireless, contact ITServices.