Researchers often collect highly confidential information for their research. It is essential this data is stored securely and is collected following data protection legislation. Failure to collect data ethically can damage the reputation of the researcher and the University. The General Data Protection Regulation (GDPR) You may be a little fed up of hearing about […]
Author: rorym

The importance of physical security
Information security isn’t just about electronic data; it’s also about physical risks too. Research shows that human error is the leading cause of security failures in organisations. Imagine a thief managed to access your office, how much confidential information could they get a hold of in just a few minutes? What is physical information security? […]

What your password says about you
Take the quiz and find out what your password says about you! Answer yes or no to the following: 1 pt: Your password does not contain your name or the names of family, partners or pets. 1 pt: You haven’t included information which may be on your social media, such as birthdates, anniversaries, where you […]

How to work away from the office securely
Working away from your usual work location takes advantage of the latest technologies, allowing you to take the office with you, working on various devices and connecting in different ways to the information you need. But there are many additional risks to information security when working in this way. Here are a few to be […]

Why are universities targeted by cyber-attacks?
In May of 2020, the cloud computing provider Blackbaud which is a major supplier to Universities across the globe was targeted by a ransomware attack. While Blackbaud managed to minimise the damage to its systems, the cyber criminals behind the attack managed to steal a subset of data. As a result, many universities in the […]

How to counter phishing, vishing, smishing, and whaling
Phishing Recently, several sophisticated phishing attacks mimicking popular online services such as Office 365 have surfaced. In a recent publication by Cofense, threat actors were found to be luring employees to accept new Terms of Use and Privacy Policies to steal Office 365 login credentials. The malicious actors went to great efforts to spoof the […]