Resources

Practicing Good Cyber Hygiene

All members of the Northeastern community have a responsibility to safeguard and secure university information and assets. By practicing good security habits, it can help reduce the risk for everyone.

Data Privacy

Maintaining data privacy is a shared responsibility that requires members of the university community to take proactive steps toward ensuring personal and institutional data, files, meetings, and digital tools are secure.

Phishing

Even when the strongest email security protocols are in place, occasional phishing or unauthorized emails can sneak into email inboxes. The Phish Bowl can help identify recent phishing attempts that have been reported or caught.

Password Protection

Passwords are the first line of cybersecurity defense on all Northeastern University online accounts. The university requires the use of strong passwords on all institutional accounts to help secure both personal and institutional data and information.

Multi-Factor Authentication

Multi-factor authentication is required to access Northeastern University’s most frequently used online services and systems. MFA provides an additional layer to protect your online identity and information.

Encrypt Your Data

Sensitive data must always be protected. Learn more about various encryption techniques and tools used to protect data-at-rest, as well as data-in-transit, and which is best suited for different use cases.

Sensitive Data Disposal

There are many times when simply recycling or throwing away paper documents is insufficient to securely dispose of university information and records. Appropriate disposal of university data is a critical component of information security.

Sponsored Accounts

Sponsored account service is available to individuals whose role is officially recognized by the university. Before requesting a sponsored account, review the service descriptions and policies.

Identity Theft Prevention

The university’s identity theft program helps protect the personal data of Northeastern faculty, staff, and students. It was developed with consideration of the size and complexity of the University’s operations and account systems, and the nature and scope of the University’s activities.