Texas Tech University

Workstation Security

  • Install Symantec Endpoint Protection, available from the University site license free of charge through the eRaider website. You can also purchase an installation CD from the ATLC Reception Desk, located in the main Library building, west basement.
  • Configure and maintain firewall settings; for more information visit:
    • Microsoft OS
    • Apple OS
    • Linux OS
  • Update and Patch Windows Operating System (OS)
  • Update and Patch Unix / Linux Operating System (OS)
    • Linux distributions have utilities for automatically applying updates such as; up2date, yum, and apt-get.
    • Note that when you enable these utilities, you will need to disable automatic updates, as the required restart may negatively impact custom applications.
    • Consult technical support for those custom applications prior to upgrading your UNIX OS.
    • Secure file deletion and free space wiping tools for Linux
  • Add systems to the TTU.EDU Domain
    For more information visit, https://www.askit.ttu.edu and search for TTU.EDU domain and your operating system.

System Authentication and Security

  • Make sure that only authorized individuals have access to confidential and sensitive data.  TTU IT can assist you with access control using eRaider, or you may choose to designate access within an application using local accounts.  Please consult your local IT professional, or you may contact TTU IT Help Central and locate an IT Division professional that can assist you.
  • Use strong passwords. (Password integrity relies heavily upon the password length, complexity, reuse, and aging).  Our eRaider Account Management System enforces strong password policies, but you should use this same approach for any local access control accounts.
  • Change default administrator accounts' passwords.
  • Social Security Numbers — all or part — must not be used as primary or secondary identifiers.
  • Use University-provided eRaider authentication for access to computer systems, applications, and databases, whenever feasible. For assistance using eRaider to provide access control, please contact IT Help Central to locate the appropriate TTU IT team.
  • Enhance the security of data on the hard drive by the following two methods:
    • Restrict user access to the directory file structure.
    • Restrict user permissions to the directory file structure.
  • Lock workstations when you are away from your system.
  • For secure remote access to university computer systems from off-campus, use Virtual Private Networking (VPN).

Desktop-level access to data

  • Store data only on computers and devices that can be secured by a strong password. Use of encryption technologies is also recommended.
  • Use secure protocols when accessing and communicating confidential and sensitive information; confidential and sensitive data should not be stored on machines.
  • Eliminate all information from devices that are to be discarded with secure file deletion tools or software
  • Utilize the University storage resources to store mission critical data.
  • Keep multiple backup copies of research data in off-site locations.

IT Services for Researchers