8. Protecting Your
Computer and
Information
• Policies and Standards
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐standard
(Additional standards/requirements
https://www.rit.edu/security/content/requirement
s‐facultystaff)
8
9. Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐standard
(Additional standards/requirements
https://www.rit.edu/security/content/requirement
s‐facultystaff)
9
10. Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐standard
(Additional standards/requirements
https://www.rit.edu/security/content/requirement
s‐facultystaff)
10
11. Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
• Patching and updates
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐standard
(Additional standards/requirements
https://www.rit.edu/security/content/requirement
s‐facultystaff)
11
12. Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
• Patching and updates
• Passwords/passphrases
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐standard
(Additional standards/requirements
https://www.rit.edu/security/content/requirement
s‐facultystaff)
12
38. Mobile Devices,
Smartphones, Tablets
• Protection commensurate with risk of information accessed or
stored
• Storage of private information is prohibited
https://www.rit.edu/security/content/desktop‐HTMLStandard
38
47. Google Reverse Image Search
• See how often that LinkedIn profile photo is being used.
• Go to LinkedIn profile.
• Chrome—Right click on image and choose
Search Google for Image
• Right click on image. Copy image address.
• Click on camera icon in Google search
window.
• Paste in image address.
47