Information Security for students
Resources to help students handle information in line with University policies and procedures.
Introduction
Multi-factor authentication
How to avoid a phishing attack
To help identify and avoid a phishing attack please follow these steps:
-
Always check the sender’s address
-
Be wary of generic greetings as opposed to your name
-
Look at the time of the email – was it sent at an unusual time?
-
Check the subject line – is an urgent reply demanded?
-
Check the content of the email
-
Check for poor spelling or grammar
-
Be wary if you’re asked to open an attachment or link to avoid either negative consequences or to gain something of value
If you think you have received a phishing email, trust your instincts and please report it to the IT Helpline by emailing [email protected]
For more information on what to do if you have responded to a phishing attempt, please go to Managing Suspicious Emails.
Concerned your personal device has been compromised? Worried about malware?
If you are concerned that your device might have been compromised then you should take the following steps:
- Disconnect from the University network
- Follow the National Cyber Security Centre guidance on how to recover your device
Worried about malware?
Consider the use of anti-virus software on your devices. If you already have AV software, it must be active (receiving regular software updates). If your trial or licence has expired, you are no longer protected so need to upgrade or replace it as soon as possible.
Ensure you remove any outdated anti-virus software you have on your devices.
Your device should get regular security updates. Make sure you install them as soon as possible: don’t turn them off or ignore them.
Report an Information Security Incident
An information security incident is:
-
A suspected, attempted, successful, or imminent threat of unauthorised access, use, disclosure, breach, modification, or destruction of information
-
Interference with the operation of information systems
-
A breach of Information Security Policy or Procedures, including the Acceptable Use of IT Systems
All users who access, use or manage University information are responsible for reporting information security incidents.
This includes concerns about the security of an IT account, computer or University IT service, as well as loss or disclosure of paper information, or weaknesses in a business process.
If you are aware of, or suspect, an information security incident is taking or has taken place, please report it by clicking the button below. Please provide as much detail as you can about the incident.
Contact the Information Security team
For any information security advice, please contact the Information Security team. Email: [email protected]