Here you will find information about Information Security, university security policies and other resources.
Data held on IT systems is valuable and critical to the business of the University. We all rely on IT to store and process information, so it is essential that we maintain Information Security.
The purpose of information security policies is to preserve, Confidentiality, Integrity and availability is the defending of information from unauthorised access, use , disclosure, disruption, modification, inspection, recording and destruction.
Confidentiality: only accessed by those with the right to do so.
Integrity: Data can be relied upon and processed correctly.
Availability: That data can be accessed when needed.
Information is critical to the success of any business, protecting information is an essential part of managing information and is a vitally important University asset and we all have a responsibility to make sure that this information is kept safe and used appropriately.
Unauthorised access by staff – both accidental and malicious.
Accidental exposure of data online.
Email & attachments
Theft or loss of laptop, mobile device, storage media or briefcase.
Always lock your P.C. (use Ctrl Alt Delete) even if going to talk to somebody at the other end of your office or when leaving the office.
Shut down your P.C. when leaving the office at the end of the day.
Keep software is up-to-date.
Make sure that your device is running the latest version of software released by the manufacturer and that all apps are regularly updated, if possible turn on automatic updates of apps.
Use a password on your device
Don’t mess with the security settings
Android, Apple and Blackberry phones are fairly secure out of the box.
Think about what you send across public WiFi hotspots
When using WiFi every other user on that network has the ability to see your data.
Turn off Cookies and Autofill
Passwords and personal information stored on devices can be gathered and used by hackers
Watch your apps
Both Android and Apple apps can be vulnerable. Make sure that you are confident in the developer before downloading and always ensure your apps come from a reputable App store.
Know where your device is at all times
Don’t leave your device visible on tables in bars or similar.
Turn off services when not in use
Services such as WiFi and Bluetooth create a line of attack for hackers, turning these services off when not in use limits the possibility of attack.
When in doubt, don't respond
Fraudulent texting, calling and voicemails are on the rise. Just like email, requests for personal information or for immediate action are almost always a scam.