WELCOME TO IT SECURITY

 

Welcome, and thank you for visiting the IT Security site.  The purpose of this site is to highlight the importance of IT security and to promote a secure computing environment for the UFV user community.

                  IT Security is Everyone's Responsibility



About IT Security

IT Security is an established area within Information Technology Services.  It was born out of a recognized need for consolidating the planning and administration of security for UFV's information network.

Some initial and ongoing objectives include:

  • Day-to-day management of information security
  • Establishing a formal IT security framework
  • Developing and maintaining comprehensive security policies
  • Contributing to UFV's business continuity/disaster recovery planning
  • Providing opportunities for IT security awareness and education
  • Implementing strategic security enhancements and upgrades

Contact

Christopher Jones, IT Security Analyst
Information Technology Services
Room G210a
Local 4566
Email: Christopher.Jones@ufv.ca


IT Security is Everyone's Concern

As the saying goes, "a chain is only as strong as its weakest link."  This applies to IT security, as well.  A safe and secure computing environment is not just the concern of the IT professionals maintaining it, but of everyone who uses it.


Everyone Can Contribute

Following are some practical ways that users can contribute to their own security as well as the security of UFV's information network.

  • Don't share your password(s) with anyone
  • Make sure that passwords are sufficiently complex (minimum of 8 characters, include a combination of uppercase, lowercase, numeric and/or special characters) where possible
  • Use a recognized anti-virus program (Microsoft Security Essentials, Norton AV, AVG, etc.) on personal computing devices
  • Keep your virus signatures up to date
  • Don't open or respond to SPAM email messages
  • Never open attachments from unsolicited email
  • Be extremely careful posting and storing personally identifiable information (PII) as identity theft is rampant
While these practices may seem obvious, they are often disregarded or ignored, exposing the user to unexpected and unwanted consequences.


Stay Informed. . .

The security landscape is changing all the time. . .so please visit this site often for updated information and tips on safe and secure computing.

Personal Information

Always be careful about where you post personally identifiable information (PII).

PII can include your:

 > Full Name 
 > Address 
 > Date of Birth 
> Social Insurance No.
> Credit Card No(s)

Malicious individuals are continually on the lookout for this type of information in order to steal your identity.

Places where you might post personal info include:

 
> "Profile Assistant" Programs
> Web Browsers
> Web Forms
> Facebook
> Twitter
> Email (unencrypted)

When it comes to revealing personal information, it’s best to keep a “low profile.” So remember:  Keep an eye on your PII.

Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV