RSS Feed
Knowledgebase : Administrative Staff > Security
In order to maintain adherence to OCAD University's Data Classification Policy it is critically important that any data classified as confidential is labelled and easily identified. Below you will find recommended label instructions and templates however you are not required to follow them as per the policy. You are required however to clearly state in ...
We are in the process of moving from DUO to MICROSOFT AUTHENTICATOR for Multi-factor authentication (MFA). Starting JUNE 18, 2020 you will receive prompts to set up Authenticator when you login to OCAD U services. Getting set up now will prepare you for the switch. The date for the switch to MFA with Authenticator will be scheduled and communicated. W...
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE This guide is for anyone using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use private personal or University information or data, whether on an occasional or regular basis. _A note for faculty and st...
Removable media can offer a convenient and secure (offline) method for transferring files. However, the potential for sensitive data to be lost or stolen is a significant risk and it is a requirement to ensure compliance that any confidential classified data be appropriately labelled and encrypted. WINDOWS INSTRUCTIONS: To enable BitLocker encrypti...
WHY CHECK THE SENDER EMAIL ADDRESS? The senders name and address is one of the easiest things to forge. Virtually anyone can send an email that looks like it's from dtrump@whitehouse.gov. IT Security and the OCAD U 365 team have put in place measures to detect and warn users when email originates from outside our institution but appears to be impersona...
Once upon a time, the risk of bugs that came with software updates seemed to be not worth the trouble. Now, the risk of NOT installing software updates far outweighs that of delaying important security updates. Hackers now ROUTINELY EXPLOIT unpatched vulnerabilities in ALL operating systems and applications (including Mac OS, iOS and Android) in ord...
Managing documents is a huge part of your work at OCAD U, and it is recommended that all files be stored in the OCAD U 365 environment especially if they are sensitive in nature (see practical guide to data privacy article here) [https://support-its.ocadu.ca/index.php?/Knowledgebase/Article/View/2382/133/practical-guide-to-data-privacy-confidentiality--...
This article contains practical guidelines for following the Information & Data Classification Policy at OCAD U [https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf]. As referenced in the policy, there are 3 classifications of data handled by staff members of the university: * PUBLIC Information in the publi...
IT Security is important and keeping your data encrypted is one thing you can do to protect yourself. What is encryption? Why does my data need to be encrypted? What is sensitive data? What encryption software is used at OCADU? Will the encryption software interfere with my productivity? FileVault (Mac) BitLocker Device Encryption (Windows 10) WHAT ...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES INTRODUCTION OCAD University employees should understand that special considerations may apply when encrypted devices are taken outside of Canada. Staff and faculty must be aware of restrictions to avoid the confiscation of their device, or other penalties. The following information...
If you configured your Administrative or Faculty email on your iPhone or Android device, you can use Outlook Web Access to remotely wipe your device in the event of loss. This avoids the personal information on your device from being accessed by criminals. 1. Click on the Log In button on the OCAD U website. 2. Enter your credentials to log in. 3....
What is Phishing? What is Spoofing? Faculty and Staff Students WHAT IS PHISHING? Phishing is the fraudulent attempt to obtain sensitive information, or data, such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. IDENTIFYING PHISHING AND MALWARE EMAIL OCADU IT Services wil...