From Cybersecurity: Avoid unauthorized software, browser extensions

Maintaining a secure computing environment is critical to helping RTD meet its strategic priorities. It allows employees to efficiently and reliably perform technology related tasks that support many of RTD’s critical functions. To reinforce the agency’s ongoing commitment to maintaining a secure and productive computing environment, Cybersecurity would like to address the installation of unauthorized software and browser extensions.

Understanding the risks

When individual users install software or browser extensions from the internet without proper authorization, it opens the door to a host of potential security threats:

Malware infections: Unauthorized software and extensions can contain malware, including viruses, trojans and ransomware. These malicious programs can compromise your computer, steal sensitive information or disrupt workflow.

Data breaches: Many unauthorized applications and extensions are designed to collect personal and corporate data. This information can be used for identity theft, corporate espionage or sale on the black market.

System vulnerabilities: Software from unverified sources may not be regularly updated or secure, leading to potential vulnerabilities that can be exploited by cybercriminals.

Performance issues: Unauthorized software can consume significant system resources, slowing down computers and affecting overall productivity.

Non-compliance: Installing unapproved software can lead to non-compliance with RTD’s IT policies and industry regulations, potentially resulting in legal and financial repercussions.

Best practices for safe software use

To protect yourself and the organization, please follow these guidelines:

Do not install unauthorized software: Avoid downloading and installing any software or browser extensions from the internet unless it has been vetted and approved by the IT department.

Request approval: If specific software or tools are required to perform job duties, please submit a request with the service desk. RTD’s IT team will review the request and ensure that the software is safe and compatible with RTD systems. In many cases, there may already be an approved application that serves the function needed.

Be cautious of prompts: Be wary of prompts or ads encouraging the installation of software or extensions. Always double-check with the IT department before proceeding.

How to submit a request

If there is a technology tool that you need, please follow these simple steps to submit a request:

Contact the Service Desk: Reach out to the service desk through the RTD Service Desk portal at https://rtd.service-now.com/sp.

Provide details: Include the name and purpose of the software or extension you need, and how it will assist you in your role.

Await approval: The IT team will review the request and provide you with guidance on next steps.

By adhering to these guidelines, employees play a vital role in safeguarding RTD against cyber threats. Cooperation and vigilance are essential in maintaining a secure and productive work environment.

If you have any questions or need further assistance, do not hesitate to contact the service desk. Thank you for your understanding and commitment to cybersecurity at RTD.