Purpose
Keeping your system secure is essential to maintaining productivity, protecting data and intellectual property, and abiding by University and partners' policies and requirements.
Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
On this page
Expand |
---|
title | Expand to view table of contents. |
---|
|
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 3 |
---|
include | |
---|
outline | false |
---|
indent | |
---|
style | default |
---|
exclude | Purpose|Audience|On this page|Search|Additional help|Related articles |
---|
type | list |
---|
class | |
---|
printable | false |
---|
|
|
Initial considerations
Evaluate possible institutional options.
Consult with your local IT group about whether an institutionally managed system would meet your needs. These systems are managed by technical experts at the University, divisional, or departmental level, allowing you to focus more on the task at hand, rather than maintaining the security of unmanaged systems.
What can I do? (Top 5)
Set up full disk encryption on your devices.
Establish and follow a backup strategy for your important data.
Install and/or enable end-point protection (antivirus, antimalware, etc.) software.
Keep your devices up-to-date.
Protect devices with unique usernames, strong passwords and/or biometrics.
What else can I do?
Physically secure your devices and data.
Use secure, encrypted methods to transfer data to and from systems.
Securely destroy data when it is no longer required for your project or subject to retention obligations.
Install ad blocking and/or content filter software.
Page Properties |
---|
|
Name | Role | Date |
---|
Michael Laurentius | Author | | Sue McGlashan | Approver (Manager) | | | Reviewer | |
|