RSS Feed
Knowledgebase : Administrative Staff > Security
In order to maintain adherence to OCAD University's Data Classification Policy it is critically important that any data classified as confidential is labelled and easily identified. Below you will find recommended label instructions and templates however you are not required to follow them as per the policy. You are required however to clearly state in ...
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE This guide is for anyone using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use private personal or University information or data, whether on an occasional or regular basis. _A note for faculty and st...
Removable media can offer a convenient and secure (offline) method for transferring files. However, the potential for sensitive data to be lost or stolen is a significant risk and it is a requirement to ensure compliance that any confidential classified data be appropriately labelled and encrypted. WINDOWS INSTRUCTIONS: To enable BitLocker encrypti...
WHY CHECK THE SENDER EMAIL ADDRESS? The senders name and address is one of the easiest things to forge. Virtually anyone can send an email that looks like it's from jbiden@whitehouse.gov. IT Security and the OCAD U 365 team have put in place measures to detect and warn users when email originates from outside our institution but appears to be impersona...
Once upon a time, the risk of bugs that came with software updates seemed to be not worth the trouble. Now, the risk of NOT installing software updates far outweighs that of delaying important security updates. Hackers now ROUTINELY EXPLOIT unpatched vulnerabilities in ALL operating systems and applications (including Mac OS, iOS and Android) in ord...
What is MFA? What do you need to do? Set up Authenticator (Video) Set up Authenticator (Written) What's next? Adding a New Phone or Secondary Device FAQ Troubleshooting - Authenticator says the Microsoft account doesn't exist - Outlook app stopped sending and receiving WHAT IS MFA? MFA is a highly effective cybersecurity measure, widely adopted in ...
This article contains practical guidelines for following the Information & Data Classification Policy at OCAD U [https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf]. As referenced in the policy, there are 3 classifications of data handled by staff members of the university: PUBLIC Information in the public d...
IT Security is important and keeping your data encrypted is one thing you can do to protect yourself. What is encryption? Why does my data need to be encrypted? What is sensitive data? What encryption software is used at OCADU? Will the encryption software interfere with my productivity? FileVault (Mac) BitLocker Device Encryption (Windows 10) WHAT ...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES INTRODUCTION OCAD University employees should understand that special considerations may apply when encrypted devices are taken outside of Canada. Staff and faculty must be aware of restrictions to avoid the confiscation of their device, or other penalties. The following information...
If you configured your Administrative or Faculty email on your iPhone or Android device, you can use Outlook Web Access to remotely wipe your device in the event of loss. This avoids the personal information on your device from being accessed by criminals. 1. Click on the Log In button on the OCAD U website. 2. Enter your credentials to log in. 3....
What is Phishing? What is Spoofing? Faculty and Staff Students WHAT IS PHISHING? Phishing is the fraudulent attempt to obtain sensitive information, or data, such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. IDENTIFYING PHISHING AND MALWARE EMAIL OCADU IT Services wil...