BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE
This guide is for all staff using personally owned devices such as
smart phones, tablet computers, laptops, netbooks and similar
equipment, to store, access, carry, transmit, receive or use
University informati...
Removable media can offer a convenient and secure (offline) method
for transferring files. However, the potential for sensitive data to
be lost or stolen is a significant risk and it is a requirement to
ensure compliance that any confidential classifie...
WHY CHECK THE SENDER EMAIL ADDRESS?
The senders name and address is one of the easiest things to forge.
Virtually anyone can send an email that looks like it's from
dtrump@whitehouse.gov. IT Security and the OCAD U 365 team have put in
place measures to ...
ONCE UPON A TIME, THE RISK OF BUGS THAT CAME WITH SOFTWARE UPDATES
SEEMED TO BE NOT WORTH THE TROUBLE.
NOW, THE RISK OF NOT INSTALLING SOFTWARE UPDATES FAR OUTWEIGHS THAT OF
DELAYING IMPORTANT SECURITY UPDATES.
Hackers now routinely exploit unpatched vu...
Managing documents is a huge part of your work at OCAD U, and it is
recommended that all files be stored in the OCAD U 365
[http://support-its.ocadu.ca/365.ocadu.ca] environment especially if
they are sensitive in nature (see practical guide to data priva...
This article contains practical guidelines for following the
Information & Data Classification Policy at OCAD U
[https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf].
As referenced in the policy, there are 3 clas...
Your privacy and confidentiality are extremely important to us in IT
Services. We work hard to put services in place that align with
relevant privacy, security and accessibility legislation at the
Provincial and Federal levels, and OCAD U's Academic and N...
WHAT IS ENCRYPTION?
"In cryptography, encryption is the process of encoding messages (or
information) in such a way that eavesdroppers or hackers cannot read
it, but that authorized parties can."
(http://en.wikipedia.org/wiki/Encryption [1])
Una...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES
INTRODUCTION
OCAD University employees should understand that special
considerations may apply when encrypted devices are taken outside of
Canada. Staff and faculty must be aware of r...
HOW DO I RESET MY PASSWORD?
How to change password
What to do if you forgot your password
Troubleshooting
Passwords must meet the following criteria:
* Be at least ten characters long, longer is better
* Not contain your username, first name ...
If you configured your Administrative or Faculty email on your iPhone
or Android device, you can use Outlook Web Access to remotely wipe
your device in the event of loss. This avoids the personal information
on your device from being accessed by crimin...
* _What is Phishing?_
* _What is Spoofing?_
* _Faculty and Staff_
* _Students_
WHAT IS PHISHING?
Identifying Phishing Emails (University of Chicago IT Services)
[https://itservices.uchicago.edu/page/identify-phishing-scams]
Identifying Fraudul...
RELATED ARTICLES: SECURITY: PHISHING EMAILS, BLOCKING SENDERS AND
MANAGING JUNK EMAIL
[HTTPS://SUPPORT-ITS.OCADU.CA/INDEX.PHP?/KNOWLEDGEBASE/ARTICLE/VIEW/781/145/SECURITY-PHISHING-EMAILS-BLOCKING-SENDERS-AND-MANAGING-JUNK-EMAIL]
MALWARE IS MALICIOUS SOFT...
CONTENTS
* Enrollment
* Usage
* Important Security Notice
* Services Not Yet Enabled for 2FA
* FAQ
ENROLLMENT
Duo Guide to Two-Factor Authentication Enrollment:
https://guide.duo.com/enrollment [https://guide.duo.com/enrollment]
PLEASE NOTE...