Arcadia University Faculty and Staff have access to a wide variety of resources. Please navigate to the below pages for more information.
Employee Resources in MyArcadia
Information Security Awareness Campaigns
Information Security and the threat landscape is always changing. It is our duty to stay current and up to date with security threats and the latest trends.
Arcadia University now offers Information Security Training for Arcadia Faculty and Staff, using a platform called KnowBe4. The offered, interactive video training modules include information about general security concepts such as the security threat landscape, how to identify phishing emails, password security, and how to safely work from home. Taking advantage of this training will not only help you protect Arcadia University data, but will also help you protect your personal information at home.
It is the responsibility of everyone at Arcadia University to participate in our Information Security initiatives to the fullest effort, and training is just the first step!
For a list of frequently asked questions about the training program, please view our KnowBe4 FAQ documentation.
Arcadia University Password Criteria
Your password is like the key to your home; you want to keep it safe and out of the hands of potential threats. Losing it or not making a secure password gives threat actors access to valuable information and assets. Follow the guidelines below to ensure your passwords are safe and secure!
All Arcadia Faculty, Staff, and Students must have a passphrase that meets the following criteria:
- At least 20 characters in length
- Must contain 3 of the 4 below parameters:
- One (1) upper case letter
- One (1) lower case letter
- One (1) number
- One non-alphanumeric character (such as: ! @ # $ % ^ &, etc.)
We highly recommend using passphrases. They are much easier for humans to remember a phrase of words than a random string of characters.
For Example: Using Bitwarden’s Password Generator and the below settings, we end up with a passphrase that is 37 characters, but only four words to remember. This is more secure and easier for users than a random 20 character password like “6oLtbyThNCvJ8fULX7M4”
Passphrase Guidelines and Tips
When creating your passphrase, remember these important tips:
- Make your passphrase as unique as you! You should never use the same passphrase for multiple accounts.
- Your passphrases should not contain:
- Your name
- Your username/email address
- Mailing addresses
- Date of birth or other important dates such as anniversaries
- Spouses/Family/Friends/Pets names and birthdays
- Your SSN or Private information
- Do not write down your passphrase or share it with anyone – not even IT!
- If you need to record your passphrase, use a secure password vault, such as LastPass or KeePass
- For additional tips on using passphrases, check out the KnowBe4 “Strong Passwords” module in your KnowBe4 Information Security Awareness Campaign
Virus Protection
A Trojan horse is a type of virus which enters a computer system by the sharing of infected program files or when an infected program is downloaded from the Internet. As the name implies, its trademark is deceptiveness. Victims are falsely lured into thinking that their computer systems will benefit from the infected program when in reality, the Trojan horse is waiting for a "trigger" event (such as open an email attachment) to occur so that it can activate its damaging behavior.
Computer Worm
A computer worm is another type of virus. It infects entire networks of computers by making a copy of itself as it moves from system to system. In recent releases, worms have been found in e-mail attachments and are activated when the victim tries to open the infected file.
Virus Symptoms
- Unusual messages or displays on your monitor
- Unusual sounds or music played at random times
- Your system has less available memory than it should
- A disk or volume name has been changed
- Programs or files are suddenly missing
- Unknown programs or files have been created
- Some of your files become corrupted or suddenly don't work properly
Protect Your Computer
- Update your operating system regularly
- Install good Anti-virus Software such as (Symantec, MacAfee, Kaspersky, Sophos, Panda)
- Keep your anti-virus software current
- Configure the antivirus to scan all removable media
- Use Firewalls on the internet
- Don’t open unknown e-mail attachments
- Know what you download from the internet
If a Virus is Discovered
- Try to clean or delete the file(s) if an anti-virus software is installed
- If you receive an email attachment that your anti-virus software flags or detects, delete it immediately
- You might also want to contact all the people that you've recently exchanged data with -- via email attachments, flash drives, etc.
Firewalls
A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. A personal computer connected to the Internet without a firewall can be hijacked and added to an Internet outlaw's botnet in just a few minutes. A firewall can block malware that could otherwise scan your computer for vulnerabilities and then try to break in at a weak point. The only way to make a home computer 100% secure is to turn it off or disconnect it from the Internet.
At a minimum, home computers need to have personal firewall, antivirus and anti-spyware software installed and kept up-to-date. A home network that uses a wired or wireless router with firewall features provides additional protection.
Recommended Firewalls
- Norton Personal Firewall from Symantec [retail]
- Sunbelt/Kerio Personal Firewall [freeware & retail versions]
- Comodo Personal Firewall [freeware]
- ZoneAlarm Pro from Checkpoint [freeware & retail versions]
Never use two personal firewall software products at the same time. Fully uninstall one before installing another to prevent compatibility problems. After installation, be sure to test it to make sure that it is configured correctly. Testing is the only sure way to tell that your computer is really being protected.
IT Resources for Working Remotely
Arcadia University faculty and staff have the ability to access university resources from remote locations. Please visit the below pages for important guidelines and documentation.
Devices
If you have a University-owned device, you should be able to connect the PC or Mac laptop to your home network and access applications needed for work.
Information Technology Help Desk has a small number of loaner computers that are available for faculty and staff use. Please reach out to helpdesk@arcadia.edu to request assistance.
Accessing Applications
Most applications you need are network accessible; you don't need any special setup to access applications. There are, however, some applications or network folders that will require a VPN connection.
Click here for a list of applications that require VPN access.
Please note: Most reported VPN issues are related to ISP services. We recommend that you review the above list of applications that require VPN connection.
Tools and Resources
There are several online tools available to you from anywhere you have internet access to help you collaborate with your colleagues.
- Google Shared Drives (store documents, share and collaboratively edit)
- Zoom (videoconferencing with built-in phone conference)
- Google Hangouts (chat, video, phone)
- Google Apps (docs, sheets, slides)
- List of Approved Tools for use at Arcadia
Microsoft Campus Agreement for Faculty & Staff
As part of the Microsoft Campus Agreement, Arcadia University employees have the legal right to obtain Microsoft software such as Office Pro and Windows 10 Upgrade on your home computers for work-related purposes.
Arcadia University has enlisted our Microsoft software vendor, JourneyEd, to administer the Microsoft work at home rights program. The software can be ordered at www.journeyed.com/select/go/CAARCADIA. After you place the order online, you will be required to fax or email a copy of your ID badge to JourneyEd. They will send you instructions for sending the verification by email once you have placed the order through their site. Once you have submitted your ID, you will receive either a license code and a link (download) or a physical CD media set.