WELCOME TO IT SECURITY

 

Welcome, and thank you for visiting the IT Security site.  The purpose of this site is to highlight the importance of IT security and to promote a secure computing environment for the UFV user community.

                  IT Security is Everyone's Responsibility



About IT Security

IT Security is an established area within Information Technology Services.  It was born out of a recognized need for consolidating the planning and administration of security for UFV's information network.

Some initial and ongoing objectives include:

  • Day-to-day management of information security
  • Establishing a formal IT security framework
  • Developing and maintaining comprehensive security policies
  • Contributing to UFV's business continuity/disaster recovery planning
  • Providing opportunities for IT security awareness and education
  • Implementing strategic security enhancements and upgrades

Contact

Christopher Jones, IT Security Analyst
Information Technology Services
Room G210a
Local 4566
Email: Christopher.Jones@ufv.ca


IT Security is Everyone's Concern

As the saying goes, "a chain is only as strong as its weakest link."  This applies to IT security, as well.  A safe and secure computing environment is not just the concern of the IT professionals maintaining it, but of everyone who uses it.


Everyone Can Contribute

Following are some practical ways that users can contribute to their own security as well as the security of UFV's information network.

  • Don't share your password(s) with anyone
  • Make sure that passwords are sufficiently complex (minimum of 8 characters, include a combination of uppercase, lowercase, numeric and/or special characters) where possible
  • Use a recognized anti-virus program (Microsoft Security Essentials, Norton AV, AVG, etc.) on personal computing devices
  • Keep your virus signatures up to date
  • Don't open or respond to SPAM email messages
  • Never open attachments from unsolicited email
  • Be extremely careful posting and storing personally identifiable information (PII) as identity theft is rampant
While these practices may seem obvious, they are often disregarded or ignored, exposing the user to unexpected and unwanted consequences.


Stay Informed. . .

The security landscape is changing all the time. . .so please visit this site often for updated information and tips on safe and secure computing.

Fake Notifications

An ongoing trend among cybercriminals is to blend social engineering with malware.

This is accomplished via the use of fake notifications.

A good example is a spurious email message that appears to have been sent from a shipping company like FedEx or UPS claiming that an item you recently shipped cannot be delivered. You are urged to contact the company immediately, and an embedded link is provided for detailed information.

However, clicking on the link results in being directed to a malicious Website where malware is waiting to be downloaded to the unsuspecting user.

To avoid an online disaster, never click on a link embedded in an email.

If you have recently shipped something and need to check its status, go directly to the shipper’s Website to inquire.

   
   
   
   

 

 

 

Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV