WELCOME TO IT SECURITY

 

Welcome, and thank you for visiting the IT Security site.  The purpose of this site is to highlight the importance of IT security and to promote a secure computing environment for the UFV user community.

                  IT Security is Everyone's Responsibility



About IT Security

IT Security is an established area within Information Technology Services.  It was born out of a recognized need for consolidating the planning and administration of security for UFV's information network.

Some initial and ongoing objectives include:

  • Day-to-day management of information security
  • Establishing a formal IT security framework
  • Developing and maintaining comprehensive security policies
  • Contributing to UFV's business continuity/disaster recovery planning
  • Providing opportunities for IT security awareness and education
  • Implementing strategic security enhancements and upgrades

Contact

Christopher Jones, IT Security Analyst
Information Technology Services
Room G210a
Local 4566
Email: Christopher.Jones@ufv.ca


IT Security is Everyone's Concern

As the saying goes, "a chain is only as strong as its weakest link."  This applies to IT security, as well.  A safe and secure computing environment is not just the concern of the IT professionals maintaining it, but of everyone who uses it.


Everyone Can Contribute

Following are some practical ways that users can contribute to their own security as well as the security of UFV's information network.

  • Don't share your password(s) with anyone
  • Make sure that passwords are sufficiently complex (minimum of 8 characters, include a combination of uppercase, lowercase, numeric and/or special characters) where possible
  • Use a recognized anti-virus program (Microsoft Security Essentials, Norton AV, AVG, etc.) on personal computing devices
  • Keep your virus signatures up to date
  • Don't open or respond to SPAM email messages
  • Never open attachments from unsolicited email
  • Be extremely careful posting and storing personally identifiable information (PII) as identity theft is rampant
While these practices may seem obvious, they are often disregarded or ignored, exposing the user to unexpected and unwanted consequences.


Stay Informed. . .

The security landscape is changing all the time. . .so please visit this site often for updated information and tips on safe and secure computing.

Following Email Links

Clicking on links in unsolicited email is like accepting candy from strangers.

Phishing attacks largely rely on luring people to follow links that lead them to malicious or compromised sites.

Often, an unfortunate consequence of clicking on these links is the downloading and installation of malicious software such as Trojans and worms – all without the victim even knowing it.

The best practice is to not open email from unknown senders.  Period.

Even with mail sent by friends or family, caution should be used when clicking on embedded links.

As for links contained in unsolicited email:  treat them like tainted candy.

   
   
   

 

 

 

Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV