Before venturing on your journey with SUNY Geneseo Technology, please review the following essential information.
Start Preparing Weeks Before Leaving
Make sure all operating systems and applications are updated.
Consult with your local IT support or contact the IT Service Desk for assistance with how to apply updates.
Install and TEST SUNY Geneseos' Virtual Private Network (VPN) Service.
SUNY Geneseos' Virtual Private Network (VPN) ensures that everything you send to SUNY Geneseo is encrypted as it goes over the network. Testing this service from off-campus is strongly recommended before your travel.
MFA for International Travel
Review the self-help document for MFA for International Travel to ensure you are not locked out of SUNY Geneseo services.
Don't leave a device at home or work auto-logging in with your credentials.
Connecting to your SUNY Geneseo account from various locations increases the likelihood of your account being locked. Don't leave devices powered on at home or work that automatically connect to your SUNY Geneseo email or other SUNY Geneseo services.
Key Steps
Secure WiFi Networks
Be wary of public WiFi networks, especially when entering passwords or accessing personal and financial information online, and avoid using public computers when possible. To ensure your privacy and security, it is advisable to refrain from transmitting sensitive data or information over the Internet whenever possible. Always seek a secure and recognized WiFi network, such as Eduroam, which is accessible at partner institutions across the globe.
VPN
Always use the University's Virtual Private Network (VPN) while you are online. VPN allows you to connect to the University network while off campus. It provides a secure connection that encrypts the information between you and the University while you are connected. Learn how to download and connect to a University-supported VPN client.
Disable WiFi, GPS, and Bluetooth
Disable WiFi, GPS, and Bluetooth functions and unused apps on your devices when not in use. These services can be used to launch attacks against your device and can be used to locate and introduce malware.
Keep Your Devices Safe
Small devices such as cell phones, laptops, hard drives, flash drives, and tablets are susceptible to theft or loss, especially while traveling.
Avoid using public charging stations
When unattended, turn your devices off and keep them secure or locked up.
Make sure to log out of any programs or accounts.
Create unique secure passwords or passcodes for each of your devices. Learn how to create a strong password and the top 10 ways to secure your mobile devices.
If your phone or laptop is stolen, report it immediately to the local police. If abroad the U.S. Embassy or Consulate can assist you in reporting the loss to the local police. Also, report the incident to your CIT immediately.