To comply with the Data Protection Act and to promote good IT security practice it is important to ensure that staff do not have greater access to University data than they need to do their jobs. When there are staff changes such as new starters, leavers and moves to other Faculties, Departments and Directorates please …
Read more
Staff starters, leavers and movers – informing IS&T
May 11th, 2016 | Posted by in IT security | Uncategorized - (0 Comments)The University receives around 25 million emails in an average month. Many of these are malicious or phishing attempts. To keep staff safe, IS&T either blocks or quarantines anything identified as harmful (only about 10 per cent of our email traffic actually drops into staff inboxes). Despite all this, occasionally a particularly sophisticated email attack gets …
Read more
By Steve Flowers Do you ever access emails or files using personal equipment or offsite? While it can be a very convenient way of working, University staff have a responsibility to take precautions which minimise the security risks involved The University has a Working Off Campus IT Security Policy, guidelines and advice for staff members …
Read more
Business Continuity Test – January 2016
November 17th, 2015 | Posted by in IT security | Protecting the University's IT Services - (0 Comments)All IT services will be at risk of disruption on Saturday 2 and Sunday 3 January. UEG agreed that IS&T should conduct another disaster recovery test while the University is closed over Christmas (following the success and usefulness of last year’s exercise). This year’s test will take place on 2 and 3 January as part …
Read more
Don’t get caught by phishing scams. This article on the BBC website shows how easy it is for people to be duped by phishing emails. Sheffield Hallam University runs virus protection and scam detection software and regularly deploys update patches to maintain security when vulnerabilities are discovered. The size of the University and the number of …
Read more
Do you use a personal mobile phone or tablet to access your University email account and calendar?
December 8th, 2014 | Posted by in IT security - (7 Comments) By Dan Riddington-Young From March, you will need any device encrypting before you can use it to connect. University files should only be accessed using encrypted devices or via the remote desktop. All University-owned devices are encrypted before they are made available to staff to use. If you choose to …
Read more
Keeping your home computer safe from viruses and hackers
June 4th, 2014 | Posted by in IT security - (0 Comments) Andy Fearnley, IT Security Officer You may have seen recent reports about attacks on web sites and malicious software which can run on your computer. It’s clear that we all need to be vigilant about which websites we visit, make sure our passwords and log in details are secure and be on the lookout …
Read more