Welcome, and thank you for visiting the IT Security site.  The purpose of this site is to highlight the importance of IT security and to promote a secure computing environment for the UFV user community.

                  IT Security is Everyone's Responsibility

About IT Security

IT Security is an established area within Information Technology Services.  It was born out of a recognized need for consolidating the planning and administration of security for UFV's information network.

Some initial and ongoing objectives include:

  • Day-to-day management of information security
  • Establishing a formal IT security framework
  • Developing and maintaining comprehensive security policies
  • Contributing to UFV's business continuity/disaster recovery planning
  • Providing opportunities for IT security awareness and education
  • Implementing strategic security enhancements and upgrades


Christopher Jones, IT Security Analyst
Information Technology Services
Room G210a
Local 4566
Email: Christopher.Jones@ufv.ca

IT Security is Everyone's Concern

As the saying goes, "a chain is only as strong as its weakest link."  This applies to IT security, as well.  A safe and secure computing environment is not just the concern of the IT professionals maintaining it, but of everyone who uses it.

Everyone Can Contribute

Following are some practical ways that users can contribute to their own security as well as the security of UFV's information network.

  • Don't share your password(s) with anyone
  • Make sure that passwords are sufficiently complex (minimum of 8 characters, include a combination of uppercase, lowercase, numeric and/or special characters) where possible
  • Use a recognized anti-virus program (Microsoft Security Essentials, Norton AV, AVG, etc.) on personal computing devices
  • Keep your virus signatures up to date
  • Don't open or respond to SPAM email messages
  • Never open attachments from unsolicited email
  • Be extremely careful posting and storing personally identifiable information (PII) as identity theft is rampant
While these practices may seem obvious, they are often disregarded or ignored, exposing the user to unexpected and unwanted consequences.

Stay Informed. . .

The security landscape is changing all the time. . .so please visit this site often for updated information and tips on safe and secure computing.


Shoulder Surfing

Ahh!  Surfing.  Riding the big wave.  Grabbing some big air.  Hanging on for dear life. . .no not that kind of surfing.  This is about another type of surfing.

“Shoulder surfing” happens when someone is looking over your shoulder while you are at your computer.

For obvious reasons, this can become a real security issue when you are entering sensitive or confidential information like passwords and credit card numbers.

Always be aware of your surroundings, and pay extra attention when you have sensitive, confidential information on your screen or your desk.





Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV