±«ÓãÖ±²¥

Staff - Admin

Cybersecurity is about safeguarding ±«ÓãÖ±²¥â€™s privacy and information.

Protecting University data and creating a cybersafe space for all activities at ±«ÓãÖ±²¥ enablesÌýus to support the ±«ÓãÖ±²¥ community while meeting our legal and regulatory responsibilities.

Each of us has a role to play in meeting this objective. Here are some guidelines and resources to help you adopt cybersecure habits and achieve our goal.Ìý

Protect your identity

  • that attempt to steal your personal information.
  • Strengthen your Password:Ìý
    • Ìýthat is unique toÌý your ±«ÓãÖ±²¥ account.
    • Use a different password for each platform or system.
  • Enable two-factor authentication on your ±«ÓãÖ±²¥ account. Two-factor authentication (2FA) is required on all ±«ÓãÖ±²¥ accounts because it helps verify that you are the person who is signing into your account. Don’t delay, enroll now at *New staff are automatically enrolled

Secure your devices

Follow some basic safety tips to keep your devices safe:Ìý

  • Ìýand password-protect to help prevent unauthorized access.
  • Apply regular updates:
  • whenever possible.
  • Install antivirus software:Ìý
    • Ìý

Access ±«ÓãÖ±²¥'s systems safely

  • ±«ÓãÖ±²¥'s Ìý(VPN) allows you to connect toÌýrestricted sites and resources.ÌýSome key systems require VPN to access remotely because they store sensitive information accessible only to authorized users.Ìý
  • To learn more about which systems require VPN, seeÌýWhen to use VPN and Remote Desktop (RDP)Ìý
  • Ensure your device is secureÌýwhen connecting to ±«ÓãÖ±²¥ remotely (see Secure your devices)

Safeguard ±«ÓãÖ±²¥'s data

Only use ±«ÓãÖ±²¥-approved storage and collaboration solutions for storing ±«ÓãÖ±²¥ organizational data.ÌýAllÌýsoftware solutionsÌýmust comply with the ±«ÓãÖ±²¥ Cloud Directive .

For more information, seeÌýIT Policies, Regulations, Directives & Standards.

Software: considerations

SeeÌý±«ÓãÖ±²¥'s cloud services websiteÌýfor details, such as:Ìý

  • Cloud solution approval process
  • Types of data and what can be stored in the cloudÌý

Protect websites and users' data

If you design or manage a website at ±«ÓãÖ±²¥, ensure that it is secure and that your visitors' privacy is protected.Ìý

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include:Ìý

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from ±«ÓãÖ±²¥ but is not - see in the IT Knowledge base.

For more information, the following resources are available:Ìý

IT Security Awareness: online training and workshops

Learn about key threats and behaviours that create risks to our organization and how to protect against these. Register online through myCourses or request a customized training session for your team.

Report security incidentsÌý

Remain vigilant against cyber threats by staying informed and reporting any suspicious activity to the IT Service Desk.Ìý

Ìý

Ìý

Ìý

Back to top