Incidents including but not limited to:
- Tentative of intrusion
- Compromised account
- Data loss or data leak
- Stolen hardware
The menace is evolving daily as attackers adapt their techniques, develop new tools, and share their knowledge with the community. Some attacks are targeted while others are opportunistic. Exploiting vulnerabilities is a profitable business.
Each person must stay alert, protect their identity, their information, friends, and families. By applying these simple measures at home and at work, we can make the world more secure:
- Never trust, always verify
- Alert when you notice suspicious activity
- Protect your identity
- Keep your devices up to date
- Share what you learn with others.
As members of the University, we must help protect personal information, our intellectual property, our work, and our reputation. Information Technology can’t do it alone, it’s a team effort!
The keys to success in implementing security are:
- Partnership across departments, faculties, and services
- Balanced security, supporting the business and Transformation 2030
- Consistent level of security, as an attacker will always find the weakest point
- Look for opportunities to improve the end-user experience.
Help yourself and learn how cybersecurity can be fun!