RSS Feed
Knowledgebase : IT Security
We are in the process of moving from DUO to MICROSOFT AUTHENTICATOR for Multi-factor authentication (MFA). Starting JUNE 18, 2020 you will receive prompts to set up Authenticator when you login to OCAD U services. Getting set up now will prepare you for the switch. The date for the switch to MFA with Authenticator will be scheduled and communicated. W...
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE This guide is for anyone using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use private personal or University information or data, whether on an occasional or regular basis. _A note for faculty and st...
Removable media can offer a convenient and secure (offline) method for transferring files. However, the potential for sensitive data to be lost or stolen is a significant risk and it is a requirement to ensure compliance that any confidential classified data be appropriately labelled and encrypted. WINDOWS INSTRUCTIONS: To enable BitLocker encrypti...
WHY CHECK THE SENDER EMAIL ADDRESS? The senders name and address is one of the easiest things to forge. Virtually anyone can send an email that looks like it's from dtrump@whitehouse.gov. IT Security and the OCAD U 365 team have put in place measures to detect and warn users when email originates from outside our institution but appears to be impersona...
Working from home now more than ever increases cyber security risk. The protective controls that are available on the university network are no longer protecting you, so increased diligence is required on your part in order to mitigate the increased risk. AT A MINIMUM please ensure you are practicing the following 3 important steps to securely work fr...
IF YOU ARE NOT USING AN OCAD U PROVISIONED LAPTOP, DIRECTLY MANAGED AND SUPPORTED BY IT SERVICES, PLEASE REVIEW THE FOLLOWING: OCAD U IT Services is recommending that if you are using a PERSONAL DEVICE (Windows or Mac) that does not already have Endpoint Protection Software that you CONSIDER INSTALLING SOPHOS HOME PREMIUM LICENSE FOR UP TO 10 DEVICES ...
ONCE UPON A TIME, THE RISK OF BUGS THAT CAME WITH SOFTWARE UPDATES SEEMED TO BE NOT WORTH THE TROUBLE. NOW, THE RISK OF NOT INSTALLING SOFTWARE UPDATES FAR OUTWEIGHS THAT OF DELAYING IMPORTANT SECURITY UPDATES. Hackers now routinely exploit unpatched vulnerabilities in ALL operating systems and applications (including Mac OS, iOS and Android) in order...
Managing documents is a huge part of your work at OCAD U, and it is recommended that all files be stored in the OCAD U 365 environment especially if they are sensitive in nature (see practical guide to data privacy article here) [https://support-its.ocadu.ca/index.php?/Knowledgebase/Article/View/2382/133/practical-guide-to-data-privacy-confidentiality--...
WHAT IS A PASSWORD MANAGER AND WHY SHOULD I USE ONE? Using a password manager is a great way to improve how we store passwords that are hard to remember. You might be used to writing passwords down in a notebook. Using a password manager is like that, except it makes it easier for you by automatically typing the passwords in for you to websites, and...
This article contains practical guidelines for following the Information & Data Classification Policy at OCAD U [https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf]. As referenced in the policy, there are 3 classifications of data handled by staff members of the university: * PUBLIC Information in the publi...
Your privacy and confidentiality are extremely important to us in IT Services. We work hard to put services in place that align with relevant privacy, security and accessibility legislation at the Provincial and Federal levels, and OCAD U's Academic and Non-Academic Policies. OCAD IT Services strives to protect the privacy of system users, and will resp...
WHAT IS ENCRYPTION? "In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can." (http://en.wikipedia.org/wiki/Encryption [http://en.wikipedia.org/wiki/Encryption]) Unauthorized access to your computer can expose sensitive student or Uni...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES INTRODUCTION OCAD University employees should understand that special considerations may apply when encrypted devices are taken outside of Canada. Staff and faculty must be aware of restrictions to avoid the confiscation of their device, or other penalties. The following information...
If you configured your Administrative or Faculty email on your iPhone or Android device, you can use Outlook Web Access to remotely wipe your device in the event of loss. This avoids the personal information on your device from being accessed by criminals. 1. Click on the Log In button on the OCAD U website. 2. Enter your credentials to log in. 3....
* _What is Phishing?_ * _What is Spoofing?_ * _Faculty and Staff_ * _Students_ WHAT IS PHISHING? Identifying Phishing Emails (University of Chicago IT Services) [https://itservices.uchicago.edu/page/identify-phishing-scams] Identifying Fraudulent Phishing Emails (Apple.com) [http://support.apple.com/kb/ht4933] Protect Your Privacy Online (...
RELATED ARTICLES: SECURITY: PHISHING EMAILS, BLOCKING SENDERS AND MANAGING JUNK EMAIL [HTTPS://SUPPORT-ITS.OCADU.CA/INDEX.PHP?/KNOWLEDGEBASE/ARTICLE/VIEW/781/145/SECURITY-PHISHING-EMAILS-BLOCKING-SENDERS-AND-MANAGING-JUNK-EMAIL] MALWARE IS MALICIOUS SOFTWARE The best defence against cyber attacks starts with you - the students, staff and faculty of OC...
CONTENTS * Enrollment * Usage * Important Security Notice * Services Not Yet Enabled for 2FA * FAQ ENROLLMENT Duo Guide to Two-Factor Authentication Enrollment: https://guide.duo.com/enrollment [https://guide.duo.com/enrollment] PLEASE NOTE: You need to have a smart phone or tablet in order to use two-factor authentication. * Once IT ...
THE FOLLOWING CONFIGURATION ITEMS ARE SET ON THE TENANT LEVEL WITH ZOOM VIDEO CONFERENCING PLATFORM 2020.03.30 To prevent increasing incidents of Zoombombing. These were set by Minesh Mandoda and Alvaro Araya. Attached file are recommended guidelines from IANS. Location (Within the Zoom Console) Account Management>Account Settings Disable Whiteboa...