SPRING SEMESTER ITS HIGHLIGHTS

Enhancing Campus Safety at ºÚÁÏÊÓÆµ | Understanding and Preventing Phishing Attacks

2024 ARCHIVED HIGHLIGHTS


April 2025

Security Infrastructure and Support: Enhancing Campus Safety at ºÚÁÏÊÓÆµ
Security light on building

At ºÚÁÏÊÓÆµ, a leading public research institution located in Vestal, New York, campus safety is a top priority. In response to evolving security challenges, the University embarked on an ambitious project to modernize its security infrastructure. This initiative was accomplished by integrating state-of-the-art Axis Communications technologies, transforming the way campus safety is effectively and more efficiently managed. The on the Axis website provides a more in-depth look at this transformation.

Wi-Fi repeater image

Project Overview and Objectives
The primary objective of this upgrade is to enhance campus safety and security while streamlining operational efficiencies. Faced with an aging and fragmented security system, ºÚÁÏÊÓÆµ set out to create a unified, responsive, and scalable security solution. Key goals included:

  • Comprehensive Surveillance: To replace obsolete cameras with advanced Axis network cameras capable of wide-angle, 360-degree, and PTZ (pan/tilt/zoom) functionalities.
  • Enhanced Communication: To integrate a robust network of speakers, intercoms, and emergency call boxes with the Alertus mass notification system, ensuring immediate and clear communication during emergencies.
  • Actionable Analytics: To leverage embedded analytics for real-time insights, such as people counting and vehicle classification, which assist in anticipating potential incidents before they escalate.
  • Operational Efficiency: To explore innovative solutions such as body-worn cameras and automatic license plate recognition (ALPR) technology, thereby reducing manual intervention and improving resource allocation.

drone photo of campus

Challenges and Modernization Approach
As the ºÚÁÏÊÓÆµ expanded into a sprawling 930-acre campus with more than 120 buildings, its security needs grew increasingly complex. The existing system was not only outdated but also ill-equipped to handle modern threats and the dynamic nature of campus life. Binghamton’s Information Technology Services (ITS) recognized the critical need for a more centralized system, and undertook the following key steps:

  • Unified Management: Implementing the Genetec Security Center allowed for central management of disparate security systems including video surveillance, access control, and mass notifications.
  • Technology Refresh: Over 1500 Axis network cameras were installed, replacing the previous analog setup with high-definition, versatile models that provide extensive coverage across the campus.
  • Integration of Communication Devices: By upgrading emergency call boxes with 2N IP Safety all-weather intercoms and enhancing the Alertus system with Axis speakers, this ensures that critical messages reach the right audience in real time.
  • Testing Innovative Solutions: The project includes ongoing tests of body-worn cameras for live streaming and ALPR-equipped cameras to automate parking permit management, further aligning security measures with technological advancements.

Security camera image

Technical and Operational Details
The modernization effort is marked by its focus on both technology and its practical application:

  • Advanced Surveillance Systems: The deployment of wide-angle and 360-degree cameras, including ultra-high-definition PTZ cameras, has allowed security teams to monitor vast areas of the campus. This is crucial for both routine surveillance and incident investigation.
  • Real-Time Analytics: The integration of advanced analytics enables campus police to count people, classify vehicles, and monitor specific areas for unusual activity. These insights are not only used for immediate security responses but also for long-term strategic planning.
  • Elevated Emergency Response: By installing updated intercom systems at dormitories and key access points, the university has enhanced the safety protocols for both students and staff. In emergency situations, video intercoms allow for rapid identity verification and controlled access.
  • Innovative Communication Solutions: The integration with Alertus allows for selective broadcasting of messages, ranging from campus-wide alerts to targeted notifications for specific zones, thereby improving the overall efficiency of emergency communications.

View of library tower

Impact on Campus Safety and Operational Efficiency

The revamped security system has delivered significant benefits:

  • Improved Surveillance and Response: With enhanced camera capabilities and centralized monitoring, campus police are better equipped to manage incidents as they unfold.
  • Streamlined Communication: The new intercoms and speakers ensure that emergency notifications are clear and effective, reducing the time it takes to mobilize a response.
  • Actionable Insights: Analytics provide real-time data that inform both immediate security responses and long-term strategic decisions, allowing for more efficient resource allocation.
  • Future-Ready Infrastructure: The integration of emerging technologies such as body-worn cameras and ALPR systems positions ºÚÁÏÊÓÆµ to adapt to future challenges in campus security.

Conclusion and Future Directions
This comprehensive upgrade not only reinforces campus safety but also highlights the critical role of our Telecommunications and ITS teams. The project is a clear example of how innovative technology, when combined with dedicated personnel, can create a safer, more efficient campus environment.

Moving forward, discussions are underway regarding further organizational changes within ITS to support continued innovation in security infrastructure. The success of this project will serve as a blueprint for future enhancements and broader applications across the campus.

, please refer to the original Axis Communications customer story.

Front image of TECH HUB

Employee and Team Highlights
This project stands as a testament to the expertise and dedication of the team behind it. Two employees, in particular, played a pivotal role:

  • Tony Mollo, Physical Security Specialist: Tony’s extensive knowledge and hands-on approach were vital throughout the project. Frequently quoted in the success story, his insights on deploying and managing high-tech security solutions underscore his commitment to campus safety.
  • David Martin, Assistant Director, Security Infrastructure and Support: David’s leadership and strategic vision were instrumental in steering the project. His focus on proactive security measures and the integration of innovative technologies has set a new standard for campus safety.
  • Visual Documentation by Likid Keomany: The dynamic visual narrative of the project, including both traditional and drone photography, was captured by Likid Keomany, Physical Security Technician. His passion for photography is evident in the striking images that document the rollout of these new technologies.

March 2025

ITS logo with cyber tips that are listed in the article

ITS Information Security: Understanding and Preventing Phishing Attacks

Phishing is a form of cyberattack where malicious actors impersonate legitimate entities to deceive individuals into divulging sensitive information such as passwords, financial details, and personal data. These fraudulent attempts typically occur through emails, text messages, phone calls, and malicious websites. Phishing attacks continue to evolve, making it crucial for individuals and organizations to recognize the warning signs and implement robust security measures to mitigate risks. Review the ITS Information Security web page and the ITS Phish Tank to learn more about cybersecurity and phishing attacks so you’re well prepared and informed so you are not duped. AND before you do anything always do a so you do not lose it.

Phishing tips checklist on how to spot one which is listed in this article

Types of Phishing Attacks

Phishing comes in various forms, each with distinct tactics designed to exploit human vulnerabilities. The most common types include:

  • Artificial Intelligence (AI): Be aware that AI-powered phishing can generate highly convincing messages, making it harder to distinguish real from fake.
  • Email Phishing: Attackers send deceptive emails that appear to come from reputable sources, often urging recipients to click on malicious links or download harmful attachments.
  • Spear Phishing: This targeted attack is personalized for specific individuals or organizations, making it harder to detect.
  • Whaling: A form of spear phishing that targets high-profile individuals such as executives and government officials.
  • Smishing (SMS Phishing): Fraudulent messages sent via text messages to trick users into sharing personal information.
  • Vishing (Voice Phishing): Cybercriminals use phone calls to impersonate legitimate authorities, such as banks or tech support, to extract sensitive data.
  • Clone Phishing: Attackers duplicate legitimate emails, replacing the original content with malicious links or attachments.

4 Smart Cyber Tips image pertaining to this article: Set up 2fa, update software regularly, think before you click, and use strong passwords

 Recognizing Phishing Attempts

If you receive an email asking for sensitive information, don't reply directly. Instead, contact the organization using a phone number or website you know is legitimate. Some of these frauds make them so believable, it's very tempting to reply without thinking. To avoid falling victim to phishing scams, individuals should be aware of common RED FLAGS:

  1. Faking or Pretending: Messages urging you to reach out to someone important in your organization.
  2. Urgency or Threats: Messages pressuring immediate action to avoid consequences.
  3. Generic Greetings: Non-personalized emails that address users as "Dear Customer" instead of by name.
  4. Suspicious Links and Attachments: Hover over links to check their actual URL before clicking.
  5. Poor Grammar and Spelling Errors: Legitimate organizations maintain professional communication standards.
  6. Unusual Sender Addresses: Check the sender's email domain for inconsistencies. If it’s a Gmail or a strange address that you do not recognize, report spam.
  7. Verify Before Sharing Information – Never disclose personal or financial information in response to unsolicited requests.
  8. Enable Multi-Factor Authentication (MFA) – Adding an extra layer of security makes it harder for attackers to access accounts.
  9. Use Strong Passwords – Regularly update passwords and use password managers for enhanced security.
  10. Keep Software Updated – Regular updates ensure vulnerabilities are patched, reducing the risk of exploitation.
  11. Be Wary of Unsolicited Requests – Always verify requests for sensitive information by directly contacting the organization through official channels.
  12. Educate Employees and Users – Conduct regular cybersecurity awareness training to help individuals recognize and respond to phishing threats.

Phishing Tips graphic, don't get caught by a phishing scam - pertaining to this article

 Reporting Phishing Incidents

If you suspect a phishing attempt or feel you may have fallen for or have been duped by a phishing scenario, follow these steps immediately:

  • Do Not Click: Avoid clicking on any suspicious links or downloading attachments.
  • Report to Authorities: Use in-platform reporting features, such as Gmail’s "Report Phishing" button, or forward the message to security teams (e.g., security@binghamton.edu or contact the Help Desk).
  • Notify Your IT Department: Organizations should report phishing attempts to their internal IT security teams to prevent potential breaches.
  • Change Compromised Credentials: If you suspect an account has been compromised, update passwords immediately.

Phishing graphic - - decorative icon

Conclusion

Phishing remains one of the most prevalent cybersecurity threats, affecting individuals and organizations worldwide. By recognizing warning signs, implementing security best practices, and educating users, the risks of phishing attacks can be significantly reduced. Staying vigilant and proactive is key to ensuring cybersecurity in an increasingly digital world.


ITS Info Sec is working our hardest to keep ºÚÁÏÊÓÆµ secure. If you have any questions or issues about information security or phishing scams in particular, after reviewing our website, please contact our and/or email security@binghamton.edu.