WELCOME TO IT SECURITY

 

Welcome, and thank you for visiting the IT Security site.  The purpose of this site is to highlight the importance of IT security and to promote a secure computing environment for the UFV user community.

                  IT Security is Everyone's Responsibility



About IT Security

IT Security is an established area within Information Technology Services.  It was born out of a recognized need for consolidating the planning and administration of security for UFV's information network.

Some initial and ongoing objectives include:

  • Day-to-day management of information security
  • Establishing a formal IT security framework
  • Developing and maintaining comprehensive security policies
  • Contributing to UFV's business continuity/disaster recovery planning
  • Providing opportunities for IT security awareness and education
  • Implementing strategic security enhancements and upgrades

Contact

Christopher Jones, IT Security Analyst
Information Technology Services
Room G210a
Local 4566
Email: Christopher.Jones@ufv.ca


IT Security is Everyone's Concern

As the saying goes, "a chain is only as strong as its weakest link."  This applies to IT security, as well.  A safe and secure computing environment is not just the concern of the IT professionals maintaining it, but of everyone who uses it.


Everyone Can Contribute

Following are some practical ways that users can contribute to their own security as well as the security of UFV's information network.

  • Don't share your password(s) with anyone
  • Make sure that passwords are sufficiently complex (minimum of 8 characters, include a combination of uppercase, lowercase, numeric and/or special characters) where possible
  • Use a recognized anti-virus program (Microsoft Security Essentials, Norton AV, AVG, etc.) on personal computing devices
  • Keep your virus signatures up to date
  • Don't open or respond to SPAM email messages
  • Never open attachments from unsolicited email
  • Be extremely careful posting and storing personally identifiable information (PII) as identity theft is rampant
While these practices may seem obvious, they are often disregarded or ignored, exposing the user to unexpected and unwanted consequences.


Stay Informed. . .

The security landscape is changing all the time. . .so please visit this site often for updated information and tips on safe and secure computing.

Beware of QR Codes

You have probably seen them: Those strangely marked squares that keep popping up on TV or in print media.

QR Code graphic

Known as QR (Quick Response) codes, they are the equivalent of bar codes.

QR codes typically contain URL information.  When scanned by a special app on a smartphone or tablet device, the user will be taken to the Website specified in the code.

Cool!  It’s a great marketing tool for legitimate businesses.

There is a caveat, however.  Once the code has been scanned, the app will then automatically launch your device’s browser.  This is not good if the site is bad.

Cyber-criminals know about QR codes, too.  Be sure to check the URL.  If the address or the site looks fishy, it probably is.

   
   
   
   
   
   

 

 
Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV