Βι¶ΉΤΌΕΔ

Staff - Admin

Cybersecurity is about safeguarding Βι¶ΉΤΌΕΔ’s privacy and information.

Protecting University data and creating a cybersafe space for all activities at Βι¶ΉΤΌΕΔ enablesΜύus to support the Βι¶ΉΤΌΕΔ community while meeting our legal and regulatory responsibilities.

Each of us has a role to play in meeting this objective. Here are some guidelines and resources to help you adopt cybersecure habits and achieve our goal.Μύ

Protect your identity

  • that attempt to steal your personal information.
  • Strengthen your Password:Μύ
    • Μύthat is unique toΜύ your Βι¶ΉΤΌΕΔ account.
    • Use a different password for each platform or system.
  • Enable two-factor authentication on your Βι¶ΉΤΌΕΔ account. Two-factor authentication (2FA) is required on all Βι¶ΉΤΌΕΔ accounts because it helps verify that you are the person who is signing into yourβ€―account. Don’t delay, enroll now at *New staff are automatically enrolled

Secure your devices

Follow some basic safety tips to keep your devices safe:Μύ

  • Μύand password-protect to help prevent unauthorized access.
  • Apply regular updates:
  • whenever possible.
  • Install antivirus software:Μύ
    • Μύ

Access Βι¶ΉΤΌΕΔ's systems safely

  • Βι¶ΉΤΌΕΔ's Μύ(VPN) allows you to connect toΜύrestricted sites and resources.ΜύSome key systems require VPN to access remotely because they store sensitive information accessible only to authorized users.Μύ
  • To learn more about which systems require VPN, seeΜύWhen to use VPN and Remote Desktop (RDP)Μύ
  • Ensure your device is secureΜύwhen connecting to Βι¶ΉΤΌΕΔ remotely (see Secure your devices)

Safeguard Βι¶ΉΤΌΕΔ's data

Only use Βι¶ΉΤΌΕΔ-approved storage and collaboration solutions for storing Βι¶ΉΤΌΕΔ organizational data.ΜύAllΜύsoftware solutionsΜύmust comply with the Βι¶ΉΤΌΕΔ Cloud Directive .

For more information, seeΜύIT Policies, Regulations, Directives & Standards.

Software: considerations

SeeΜύΒι¶ΉΤΌΕΔ's cloud services websiteΜύfor details, such as:Μύ

  • Cloud solution approval process
  • Types of data and what can be stored in the cloudΜύ

Protect websites and users' data

If you design or manage a website at Βι¶ΉΤΌΕΔ, ensure that it is secure and that your visitors' privacy is protected.Μύ

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include:Μύ

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from Βι¶ΉΤΌΕΔ but is not - see in the IT Knowledge base.

For more information, the following resources are available:Μύ

IT Security Awareness: online training and workshops

Learn about key threats and behaviours that create risks to our organization and how to protect against these. Register online through myCourses or request a customized training session for your team.

Report security incidentsΜύ

Remain vigilant against cyber threats by staying informed and reporting any suspicious activity to the IT Service Desk.Μύ

Μύ

Μύ

Μύ

Back to top