Ensuring Security

The key areas to consider when safeguarding the University's information and assets are listed below:

1.  Update your software.

  • New versions of software are released to address security problems that have been found. Updating your software ensures you take full advantage of all the security upgrades.
  • If you do not update the software you can put your computer at risk of viruses and other problems because the software is no longer supported.
UniSA applies updates to your University devices automatically, so you just need to accept the updates/restart your computer when asked.
See: Viruses & Malware

 

2.  Use anti-virus software.

  • Anti-virus companies spend their time ensuring their software helps stops known viruses. If you have a current and up-to-date version, you can be assured that the software is looking out for problems and blocking them.
UniSA regularly checks your University devices using virus software called Symantec Endpoint Protection.  However, you are able to perform a manual scan at any time and you should also ensure that any portable or personal devices that may be used for work purposes are also checked regularly.
See: How do I use Symantec Endpoint Protection to scan my hard drive?

 

3.  Be suspicious of unsolicited phone calls or emails.

  • Unsolicited emails and phone calls are trying to get you to do something that will benefit someone else. It might be just spam trying to get you to buy things, or it might be trying to get you to access something that will put a virus on your computer or give others access to your information.
UniSA has a number of methods to reduce the amount of spam and phishing phone calls or emails received by the University, however sometimes this gets through.
See: Spam and Phishing

4.  Back up your data.

  • If you have a problem with your computer and it needs to be reset or even replaced, you will still have access to your information if you have backed it up.
UniSA automatically backs up data held in a number of systems, such as Outlook.  It also backs up shared drives and SharePoint sites.  Any files saved on a C:\ drive are not automatically backed up.  Consider moving these to a shared area or using other means to back these files up.
See: How do I back up my files?

5.  Use legitimate software.

You should always use legitimate software that you have purchased from a vendor or downloaded from the company’s website. Why?

  • Using pirated copies of software on University devices will mean that the University could be prosecuted if discovered.
  • If you use pirated copies you open up your computer to viruses that you may not know about. The software itself may contain a virus, or it won’t be supported by the vendor, meaning you won’t receive regular security updates.
UniSA provides access to many programs as a default on all University devices (Standard Operating Environment).  If specific software is required for work purposes it can easily be purchased.
See: UniSA Standard Operating Environment (SoE)
See: Software Licensing

6.  Set strong passwords and use different passwords for different accounts.

  • A password that is strong and changed regularly makes it harder for people to access your information.
  • If you use the same password for all your accounts and one account is compromised, the person accessing your account is more likely to be able to guess all your other passwords and access those accounts too.
  • If you store an unencrypted list of your passwords on your computer and someone gains access to the computer, they then have all your passwords.
UniSA recommends that you set a strong password for University systems.  Strong passwords reduce the chance that someone is able to break into your account.  You should ensure that you use different passwords for work and personal accounts wherever possible.
See: How do I choose a secure password?

8.  Do not lose your device.

  • If someone gets your device, they may have access to all your information and plenty of time to access it.
UniSA recommends that you make sure you know where your tablet, phone or laptop is at all times and that you avoid leaving them unattended unless locked away in a drawer or cupboard.  You should also protect the device using encryption or passwords.
See: Mobile & Portable Storage Devices

 

Adapted from: Department of Defence - Defence Signals Directorate

www.dsd.gov.au/publications/csocprotect/home_computer_security.htm

Friday, 18 January 2013