Combining best practices with industry-leading innovation, ITScreates an environment that balances the ʹڹ community's need to protect information with the importance of privacy.
Stay up to date on the latest scams, software patches, tips, and more.
Concerned Your Computer Is Infected?
When ransomware hits, a criminal takes ownership of the infected device’s files and insists they will not be unlocked unless “ransom” is paid. If your computer is backed up, you are less likely to be exploited by a ransomware attack.
You can unknowingly download ransomware onto a device by opening an infected email attachment, clicking an ad, following a bad link, or even visiting a website that has malware embedded.
Remember to stop and think when you get an email you are not expecting, even if it appears to be from someone you know.
Checking the actual “from” address of an email is a smart step to avoid scams.

This message appears to be from “Prof. Greyson Ryan” but the “from” address does not end with @bc.edu and is not “signed-by” ʹڹ.EDU. This message should not be trusted.
- Emails claiming to be from a “ʹڹ” person without an @bc.edu email address should be viewed withextreme skepticism. A sender name is easy to fake.
- If you aren’t sure if an email is authentic, instead of replying, contact the sender using information you already have about them (such as their ʹڹ email address from the ʹڹ Directory).

The “from” address of this message is valid, since it ends with @bc.edu and is “signed-by” ʹڹ.EDU. This message can be trusted.
When a computer is not up-to-date with software updates, it is more vulnerable to ransomware attacks, malware, and data breaches. Updates for your operating system, browsers, antivirus program, and any other program you run on your computer help protect your devices (and your files) from the latest threats.
We recommend you set your operating system and software to update automatically to ensure the latest security vulnerabilities are addressed:
Enable auto-update for your devices:
**Restart regularly. Get into the habit of shutting down and restarting your computer and devices on a regular basis so that any updates can be installed at restart.
Enable auto-update for your apps/programs.
- Browsers
- Microsoft Office
- NOTE: Microsoft 365 automatically updates.
ʹڹ 2-Step Verification uses Duo Security technology to confirm your identity using a second device such as a mobile phone, tablet, or landline phone. 2-Step Verification is required for EagleVPN, PeopleSoft, and other ʹڹ services.
ITS Recommends the Duo Mobile App
If you still rely on a text message or phone call for 2-Step Verification, read on to learn why theDuo Mobile Appis highly recommended.
- Ease of use:You receive a “push” notification to your mobile device, and simply click “Approve.”IMPORTANT: Only click “Approve” if you are actually trying to log in. Click “Deny” if you’re not, this could mean a bad actor is trying to log in to your account.
- Offline access:Get a passcode from the app even when you don’t have cellular or wifi access.
- Save the University money:Every time you use text messaging or a phone call for 2-Step Verification, it costs ʹڹ money. 2-Step Verification via the Duo App is free.
ITS recommends you use Eagle VPN when connecting your smartphone, tablet, or laptop to any public or hotel WiFi. When you use ʹڹ's Eagle VPN, even for personal vacation use, the traffic to/from your device is encrypted so the online criminals can't see it.
When you use your ʹڹ email address or ʹڹ computer to sign up for online services or get software, even if they are free, you may be putting your personal information and Boston College data at risk.
To be cyber safe, if you are interested in any software, hardware, or technology services, even if they are free, please use the “Get Tech” process.