Skip to main content

Current Threats

Ransomware – a type of malware which ‘locks’ the files on a computer and then demands payment to unlock them – is a growing threat all across the world. Find out more >>

Information Security

 The business of the University depends heavily on computerised information systems, in particular:

  • Data which is often sensitive and must be protected from loss, corruption and unauthorised access
  • Re-entry of lost data can be painstaking and very time consuming 
  • Loss of data can impact upon deadlines and can have wide ranging implications - including breach of legal requirements
  • Electronic records are increasingly becoming the only source of original data

For latest information on internet security Get Safe Online [External Website]

It is important that you read Data and Information Security Policies and Acceptable Use Guidance

Protecting Your Devices

For information on Ransomware please see Protecting Against Ransomware Attacks

Advice on Phishing 

This 4-page PDF defines and gives advice to help you respond to phishing attempts.

Password Guidance

Protecting your devices

Data and Information Security Policies and Acceptable Use Guidance

These apply to all members of staff, visitors, contractors and students of the University and must be read before computer resources are used.

Acceptable UseData/Information Security
 Computer Resources - Acceptable Use Policy   Information Security Policy
 Staff Computing at Queen's - Acceptable Use Guide   Information Handling
 Student Computing at Queen's - Acceptable Use Guide   Mobile Computing Policy
    Data Security Guidance
    Password Policy

Microsoft Defender for Office 365

Information Services is implementing Microsoft Defender for Office 365 which will add some additional features to protect users from malware, phishing and spam emails.

Security Tips

  • Roll the mouse over a link to see its destination, in a browser this will be displayed in the bottom left corner and in Outlook it is displayed above the link.
  • Be suspicious of unknown sources or even links from trusted sources - if in doubt, seek advice or delete it.
  • Always think twice before clicking a link.
  • Report security incidents or scam emails asking for your credentials to IT immediately.
  • Never leave your phone, tablet, or laptop unattended.‌‌

Top Tip

Last Updated: October 2020