Services available to help researchers secure and protect data and systems
Ìý
Information security breach
- If you have experienced a security breach involving electronic data and/or an online system, you are expected to notify the University Privacy Officer and IST’s security team within 72 hours.
Research Project Cybersecurity Planning
- This document is intended to help Principal Investigators (PIs) at the University of À¶Ý®ÊÓÆµ develop cybersecurity plans for their research projects.Ìý
- Device encryption (laptops, mobile devices, tablets) helps to reduce the risk of unintentional information exposure resulting from loss or theft of mobile devices.
- Many options exist for ensuring the security of email accounts and content, including email encryption; resources for identifying and reporting phishing attempts; requesting and installing email certificates.Ìý
- Vulnerability scans routinely look for vulnerable network-accessible services, and can also be performed upon request.ÌýThis service can also include installing agents on endpointsÌýfor better monitoring.
-
With consultation and approval from the Special Constable Service, IST will design and install an intrusion detection system to meet the security needs of the space. Special Constable Service approval includes a response to triggered alarms.ÌýSystemÌýmay include motion sensors, glass breaks, vibration sensors, door contacts, panic buttons, and keypads.