RSS Feed
Knowledgebase : Students and Faculty > Security
ATTENTION ANDROID USERS! A vulnerability has been discovered in the Android operating system that allows an attacker to access data stored on your device or remotely install software merely by having your mobile phone number. This vulnerability is being ...
IN ORDER TO MAINTAIN ADHERENCE TO OCAD UNIVERSITY'S DATA CLASSIFICATION POLICY IT IS CRITICALLY IMPORTANT THAT ANY DATA CLASSIFIED AS CONFIDENTIAL IS LABELLED AND EASILY IDENTIFIED. BELOW YOU WILL FIND RECOMMENDED LABEL INSTRUCTIONS AND TEMPLATES HOWEVER ...
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE This guide is for all staff using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use University informati...
Removable media can offer a convenient and secure (offline) method for transferring files. However, the potential for sensitive data to be lost or stolen is a significant risk and it is a requirement to ensure compliance that any confidential classifie...
DATA BACKUP Every year, we have at least two or more Fourth Year Thesis students with lost projects and unrecoverable data. DO NOT BE THIS PERSON. ALWAYS HAVE AT LEAST TWO COPIES OF YOUR DATA IN TWO DIFFERENT PLACES IN CASE ONE IS LOST OR CORRUPTED. ...
This article contains practical guidelines for following the Information & Data Classification Policy at OCAD U [https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf]. As referenced in the policy, there are 3 clas...
WHAT IS ENCRYPTION? "In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can." (http://en.wikipedia.org/wiki/Encryption [1]) Una...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES INTRODUCTION OCAD University employees should understand that special considerations may apply when encrypted devices are taken outside of Canada. Staff and faculty must be aware of r...
WHY CHECK THE EMAIL ADDRESS? The senders name and address is one of the easiest things to manipulate about an email. Virtually anyone can send an email that looks like it's from dtrump@whitehouse.gov. To avoid people impersonating OCAD U staff and studen...
HOW DO I RESET MY PASSWORD? How to change password What to do if you forgot your password Troubleshooting Passwords must meet the following criteria: * Be at least ten characters long, longer is better * Not contain your username, first name ...
If you configured your Administrative or Faculty email on your iPhone or Android device, you can use Outlook Web Access to remotely wipe your device in the event of loss. This avoids the personal information on your device from being accessed by crimin...
* _What is Phishing?_ * _What is Spoofing?_ * _Faculty and Staff_ * _Students_ WHAT IS PHISHING? Identifying Phishing Emails (University of Chicago IT Services) [https://itservices.uchicago.edu/page/identify-phishing-scams] Identifying Fraudul...