Knowledgebase
(131)Administrative Staff
(32)Canvas Cloud
(14)ePortfolio
(2)IT Info Sessions - Recordings
(15)IT Security
(58)Laptop Program
(4)macOS
(14)Microsoft 365
(16)Microsoft Teams
(4)Microsoft Windows
(2)Online Events
(14)Remote Teaching and Learning
(6)Research
(183)Students and Faculty
(17)TechSmith Knowmia
BYOD (BRING YOUR OWN DEVICE) SECURITY GUIDE
This guide is for anyone using personally owned devices such as smart
phones, tablet computers, laptops, netbooks and similar equipment, to
store, access, carry, transmit, receive or use private personal or
University information or data, whether on an occasional or regular
basis.
_A note for faculty and st...
Removable media can offer a convenient and secure (offline) method
for transferring files. However, the potential for sensitive data to
be lost or stolen is a significant risk and it is a requirement to
ensure compliance that any confidential classified data be
appropriately labelled and encrypted.
WINDOWS INSTRUCTIONS:
To enable BitLocker encrypti...
WHY CHECK THE SENDER EMAIL ADDRESS?
The senders name and address is one of the easiest things to forge.
Virtually anyone can send an email that looks like it's from
jbiden@whitehouse.gov. IT Security and the OCAD U 365 team have put in
place measures to detect and warn users when email originates from
outside our institution but appears to be impersona...
Working from home now more than ever increases cyber security risk.
The protective controls that are available on the university network
are no longer protecting you, so increased diligence is required on
your part in order to mitigate the increased risk.
AT A MINIMUM please ensure you are practicing the following 3
important steps to securely work fr...
IF YOU ARE NOT USING AN OCAD U PROVISIONED LAPTOP, DIRECTLY MANAGED
AND SUPPORTED BY IT SERVICES, PLEASE REVIEW THE FOLLOWING:
OCAD U IT Services is recommending that if you are using a PERSONAL
DEVICE (Windows or Mac) that does not already have Endpoint Protection
Software that you CONSIDER INSTALLING SOPHOS HOME PREMIUM LICENSE FOR
UP TO 10 DEVICES ...
Once upon a time, the risk of bugs that came with software updates
seemed to be not worth the trouble.
Now, the risk of NOT installing software updates far outweighs that of
delaying important security updates.
Hackers now ROUTINELY EXPLOIT unpatched vulnerabilities in ALL
operating systems and applications (including Mac OS, iOS and Android)
in ord...
What is MFA?
What do you need to do?
Set up Authenticator (Video)
Set up Authenticator (Written)
What's next?
Adding Another Device
FAQ
Troubleshooting
- Authenticator says the Microsoft account doesn't exist
- Outlook app stopped sending and receiving
WHAT IS MFA?
MFA is a process where a user is prompted during the sign-in process
for an addition...
WHAT IS A PASSWORD MANAGER AND WHY SHOULD I USE ONE?
Using a password manager is a great way to improve how we store
passwords that are hard to remember.
You might be used to writing passwords down in a notebook. Using a
password manager is like that, except it makes it easier for you by
automatically typing the passwords in for you to websites, and ...
This article contains practical guidelines for following the
Information & Data Classification Policy at OCAD U
[https://www.ocadu.ca/Assets/content/it/OCAD+U+Information+and+Data+Classification+Policy.pdf].
As referenced in the policy, there are 3 classifications of data
handled by staff members of the university:
PUBLIC
Information in the public d...
Your privacy and confidentiality are extremely important to us in IT
Services. We work hard to put services in place that align with
relevant privacy, security and accessibility legislation at the
Provincial and Federal levels, and OCAD U's Academic and Non-Academic
Policies. OCAD IT Services strives to protect the privacy of system
users, and will resp...
IT Security is important and keeping your data encrypted is one thing
you can do to protect yourself.
What is encryption?
Why does my data need to be encrypted? What is sensitive data?
What encryption software is used at OCADU?
Will the encryption software interfere with my productivity?
FileVault (Mac)
BitLocker Device Encryption (Windows 10)
WHAT ...
SECURITY CONSIDERATIONS FOR INTERNATIONAL TRAVEL WITH MOBILE DEVICES
INTRODUCTION
OCAD University employees should understand that special
considerations may apply when encrypted devices are taken outside of
Canada. Staff and faculty must be aware of restrictions to avoid the
confiscation of their device, or other penalties. The following
information...
If you configured your Administrative or Faculty email on your iPhone
or Android device, you can use Outlook Web Access to remotely wipe
your device in the event of loss. This avoids the personal information
on your device from being accessed by criminals.
1. Click on the Log In button on the OCAD U website.
2. Enter your credentials to log in.
3....
What is Phishing?
What is Spoofing?
Faculty and Staff
Students
WHAT IS PHISHING?
Phishing is the fraudulent attempt to obtain sensitive information, or
data, such as usernames, passwords and credit card details by
disguising oneself as a trustworthy entity in an electronic
communication.
IDENTIFYING PHISHING AND MALWARE EMAIL
OCADU IT Services wil...
MALWARE IS MALICIOUS SOFTWARE
The best defence against cyber attacks starts with you - the students,
staff and faculty of OCAD U.
Malware is software - usually delivered in the form of an attachment
like a Microsoft word, PDF file or a link to a malicious site - which
may attempt to gather sensitive information, damage your computer or
display unwant...
Help Desk Software by Kayako