Jump to Footer

Information Security

SUNY Plattsburgh faculty, staff, and students require secure computer systems and networks to accomplish the college’s mission of teaching, learning, and research. To help ensure that requirement is met, our ITS Information Security team works to protect the security of campus systems, networks, and accounts.

We support the confidentiality, integrity, and availability of our college’s distributed information technology assets, systems, networks, and data. We also work to educate the campus community in order to promote the safest possible technology environment.

Knowing the Facts is Your First Defense

These days, threats to our information security are all too common. Attacks can cause loss of trust by users. Data can be compromised. Forced downtime can cripple campus functions.

Your awareness of information security basics can make all the difference.

First, Some Definitions

“Information security” refers to the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

It is concerned about where data is stored and how it moves through networks. It protects both our digital and physical data from intruders

Be Aware of Common Risks

SUNY Plattsburgh has multiple protection systems in place. But your actions as a user of technology matter — a lot. You are a critical factor in the line of defense.

We recommend these essential safety practices:

  • Use caution. Seemingly small acts of negligence can compromise network security on campus. Mobile phones and email phishing scams are especially prevalent threats.
  • Secure your password: Choose a strong password and never share it.
  • Keep backup files of all important information on your computer.
  • Never open e-mail messages or attachments from unsolicited sources. Doing so can expose your system to destructive viruses and ransomware.
  • Never give out private information to unsolicited emails or telephone calls. In this way you’ll protect yourself from fraud, hoaxes and “phishing” scams.

Learn More

Back to top