The University will shortly be releasing an improved online application form for all full-time postgraduate taught courses; the online system will also be available for some part-time courses. The online application will be clearly signposted to applicants from individual course entries within the online prospectus pages and this will be the default application route, however …
Read more

Digital Technology Services has now completed the upgrade to our University’s internet connection to provide a tenfold increase in our network capacity.  This work has greatly enhanced current performance – you may already have noticed a faster service – and, together with the IT Network improvement programme which is underway across campus, will ensure we …
Read more

Ransomware is a type of malware used for hijacking data in which the attacker encrypts data making it inaccessible and demands payment for the decryption key.  It installs covertly on a computer, typically carried out using a Trojan (a type of virus) disguised as a legitimate file, which is spread through email attachments, infected programs and compromised websites. …
Read more

The December holiday period, when online retail activity peaks, is a particularly rewarding time of year for cyber criminals. You can help protect yourself – and the University – by being alert to the dangers and thinking carefully before you respond to anything if you’re not absolutely sure of the provenance.  Some attempts are easy …
Read more

Several items of portable IT equipment have been lost or stolen both on and off-site recently, including laptops and mobile phones. Obviously these are easily portable and attractive to thieves. To diminish the risk of loss occurring, staff should bear the following in mind; Portable equipment should be locked away at the end of each …
Read more

Phishing uses fraudulent emails, texts and phone calls (vishing) to trick recipients into handing over personal and financial information such as account details and passwords. Such attempts are becoming increasingly professional and try to appear to be genuine by mimicking the look and brand of trusted companies. There are several ways to spot phishing emails: …
Read more

The act of manipulating people into performing actions or divulging confidential information is known as social engineering. There are many forms of social engineering, and you need to be on your guard. People may attempt to collect personal information from you, or to relieve you of your IT equipment. Points to note include; Shoulder surfing. …
Read more

  Wednesday 13 July, Cantor 9234 Are you currently using the new phone system (Unified Communications/SHUWAY)? Would you like to find out more about its capabilities and how you can make the most of using it? Join us at one of our training sessions on the 13th July. To book on to the training, please email shuway@shu.ac.uk …
Read more

Feedback to IT

July 6th, 2016 | Posted by Hannah Taylor in Uncategorized - (0 Comments)

Several feedback initiatives have been implemented within IT Help with the aim to gain more understanding of our staff and students and their experiences when they’ve received support from IS&T. We consistently collect feedback from several sources: Event surveys Once a query has been resolved, you are asked to rate the service you just received …
Read more

The University has a IT Security website formerly named ‘EISF’.  Recently it has been renamed to make it easier to locate and remember –  It is now called ‘IT Security – Policies, Procedures and Guidance’. The web address has not changed from http://eisf.shu.ac.uk/  so any links you have in documents, on websites and in your …
Read more