Employees working away from their respective campuses can use a variety of online tools and services to stay connected and productive, including secure access to: 

  •  

Stay Connected

Campus-Specific Resources

91Ïã½¶¶ÌÊÓÆµâ€“Columbia

  •  
  •   

91Ïã½¶¶ÌÊÓÆµâ€“Kansas City

  •  
  •   

Missouri University of Science and Technology

  •   
  •   

91Ïã½¶¶ÌÊÓÆµâ€“St. Louis

  •  
  •   

Best Practices When Traveling

Update your operating system, applications and anti-virus software on your mobile devices. Operating systems, applications and anti-virus software all offer periodic updates containing vital security patches. Keep your system on current versions. 

Ensure your firewall is enabled. This prevents others from connecting to your device over the network. 

Encrypt confidential information stored on your devices. Most mobile devices come with encryption capabilities built in. If not, you may install encryption applications. You should consult your vendor’s application store or marketplace for information on what is available. 

Configure your device for remote wiping. If your device is lost or stolen, remote wiping allows you the capability to erase all data and personal information stored on the device. Affix a label to the back of your device with your name, email and phone number to increase the likelihood of misplaced belongings being returned to you. 

Do not post travel plans on social media sites. You should always limit the amount of personal information you share on these sites. While your account may be set up securely, you have no control over how your friends set up their accounts. 

Use sponsored Wi-Fi networks hosted by legitimate organizations and pay attention to the Wi-Fi encryption types. Your online activities can be monitored by others while you are connected to a public network. Protect yourself by ensuring you are on a legitimate Wi-Fi connection. Look for posted signs found in hotel lobbies, airport terminals or cafés displaying the name of the supported Wi-Fi network. Also, the most common Wi-Fi encryption types (ordered by most secure to least secure) are: WPA2, WPA and WEP.  

Limit your web browsing to well-known and trusted websites and use encryption when possible. Using email and web browsing features poses the threat of phishing scams, malicious sites, infected attachments and other scams. Use SSL encryption (https://) for web browsing when possible. An Https:// browser session automatically encrypts data transmitted over the Internet. Also, most email service providers offer an encryption option. If available, enable the SSL option for your email.  

Keep optional network connections, such as Bluetooth and Wi-Fi, turned off when not in use. If using these features in public, limit the amount of personal information you view. SMS, MMS, Bluetooth and synchronization are all potential attack routes. 

Limit your use of public computers to casual web browsing only. Public computers may be infected with malware or keyloggers. If you have no choice but to use a public computer to make a transaction or to communicate sensitive information, you should assume any information shared could be compromised. Keep track of the accounts you accessed on a public computer and change your passwords immediately once you are on a trusted computer and network. 

Turn off cookies and autofill options. If your mobile device automatically enters passwords and login information into websites you visit frequently, turn this feature off. While convenient, these options pose privacy threats.  

Always keep your device on you or locked in a secure location. You should place mobile devices in your carryon luggage. Do not check these items. There is no guarantee your luggage will arrive at your destination at the same time as you and there is always a risk of baggage being ransacked before you obtain it. If you are on a road trip, you should lock electronics in the glove compartment or rear storage of the vehicle.  

Make use of personal Wi-Fi hotspots. If an emergency arises and you need to use a wireless network, set up a personal hotspot on your device, or use a virtual private network (VPN) to ensure a secure internet connection. 

Change your password immediately. For suggestions on creating a strong password, visit Password Management

If your device has been compromised, misplaced or stolen, you should employ remote wiping. If you did not configure your device for remote wiping beforehand, you still have the capability to wipe your Microsoft Exchange account. Faculty, staff and students may request remote wiping of their University email account, contacts and calendar. For assistance with this process, contact IT Tech Support at 573-882-5000.   

Frequently Asked Questions

You'll need a connection capable of download speeds of at least 1.5 megabits per second (Mbps). 

Most of the technology resources available to our faculty, staff and students do not require a VPN. However, some on-campus IT resources require the use of (VPN), a tool that provides encryption between your computer and campus resources. All university laptops come with the Cisco VPN client installed. If you are using your personally owned computer, please contact your campus IT Help Desk for instructions about downloading the VPN client. 

The campus resources that require a VPN when working off campus include: 

  • Remote Desktop Access to Workstations that remain on campus 
  • Access to Network File Shares / Network Drives 
  • (Set up call forwarding and managing voicemail) 
  • Some departments have specialized systems that need VPN. 

Most of the tools you use every day are easily accessed online. PeopleSoft (includes MyHR and Finance), OneDrive, Webmail, Email, TeamDynamix (TDX), Zendesk, Canvas and Jabber all are readily accessible. These tools do not require a (VPN) connection, but it is recommended to connect securely through a VPN if you are working and using a public, unsecured wireless network.