Knowledgebase
(128)Administrative Staff
(32)Canvas Cloud
(15)ePortfolio
(2)IT Info Sessions - Recordings
(19)IT Security
(49)Laptop Program
(5)macOS
(15)Microsoft 365
(16)Microsoft Teams
(5)Microsoft Windows
(3)Online Events
(18)Remote Teaching and Learning
(6)Research
(183)Students and Faculty
(17)TechSmith Knowmia
Knowledgebase : Students and Faculty > Security
In order to maintain adherence to OCAD University's Data
Classification Policy it is critically important that any data
classified as confidential is labelled and easily identified. Below
you will find recommended label instructions and templates however you
are not required to follow them as per the policy. You are required
however to clearly state in ...
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE
This guide is for anyone using personally owned devices such as smart
phones, tablet computers, laptops, netbooks and similar equipment, to
store, access, carry, transmit, receive or use private personal or
University information or data, whether on an occasional or regular
basis.
_A note for faculty and st...
Removable media can offer a convenient and secure (offline) method
for transferring files. However, the potential for sensitive data to
be lost or stolen is a significant risk and it is a requirement to
ensure compliance that any confidential classified data be
appropriately labelled and encrypted.
WINDOWS INSTRUCTIONS:
To enable BitLocker encrypti...
WHY CHECK THE SENDER EMAIL ADDRESS?
The senders name and address is one of the easiest things to forge.
Virtually anyone can send an email that looks like it's from
jbiden@whitehouse.gov. IT Security and the OCAD U 365 team have put in
place measures to detect and warn users when email originates from
outside our institution but appears to be impersona...
Once upon a time, the risk of bugs that came with software updates
seemed to be not worth the trouble.
Now, the risk of NOT installing software updates far outweighs that of
delaying important security updates.
Hackers now ROUTINELY EXPLOIT unpatched vulnerabilities in ALL
operating systems and applications (including Mac OS, iOS and Android)
in ord...
BACKUP YOUR DATA
Every year, we have at least two or more Fourth Year Thesis students
with lost projects and unrecoverable data. PLEASE DO NOT BE THIS
PERSON.
ALWAYS HAVE AT LEAST TWO COPIES OF YOUR DATA IN TWO DIFFERENT PLACES
IN CASE ONE IS LOST OR CORRUPTED.
* Use an external storage device to back up your files using Time
Machine [https://s...
This article contains practical guidelines for following the
Information & Data Classification Policy at OCAD U
[https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf].
As referenced in the policy, there are 3 classifications of data
handled by staff members of the university:
PUBLIC
Information in the public d...
IT Security is important and keeping your data encrypted is one thing
you can do to protect yourself.
What is encryption?
Why does my data need to be encrypted? What is sensitive data?
What encryption software is used at OCADU?
Will the encryption software interfere with my productivity?
FileVault (Mac)
BitLocker Device Encryption (Windows 10)
WHAT ...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES
INTRODUCTION
OCAD University employees should understand that special
considerations may apply when encrypted devices are taken outside of
Canada. Staff and faculty must be aware of restrictions to avoid the
confiscation of their device, or other penalties. The following
information...
If you configured your Administrative or Faculty email on your iPhone
or Android device, you can use Outlook Web Access to remotely wipe
your device in the event of loss. This avoids the personal information
on your device from being accessed by criminals.
1. Click on the Log In button on the OCAD U website.
2. Enter your credentials to log in.
3....
What is Phishing?
What is Spoofing?
Faculty and Staff
Students
WHAT IS PHISHING?
Phishing is the fraudulent attempt to obtain sensitive information, or
data, such as usernames, passwords and credit card details by
disguising oneself as a trustworthy entity in an electronic
communication.
IDENTIFYING PHISHING AND MALWARE EMAIL
OCADU IT Services wil...
Help Desk Software by Kayako