|
Is your research at risk?
|
|
|
|
|
There is a need to focus more on IT security based on external threats. Here are 8 tips to improve IT security:
-
Be aware of the threat and the methods used (espionage etc.)
-
Assess the value of your reasearch (consider which data and information you cannot afford to loose?)
-
Set the framework for foreign visitors (as an example it is better for the guest to bring his or her own computer, instead of borrowing a local machine)
-
Be careful when travelling (in general, you are more exposed to theft, cyber threats etc. abroad, when using Wi-Fi etc.)
-
Focus on your IT security (do not click on attached files or links if you do not know whether or not to trust the source, do not USB sticks unless you trust the person who provided them)
-
Focus on physical security (your ID card should be visible when you are at work on campus)
-
Be careful, particularly when someone requests (personal) information which you should not share
-
Report if you believe that IT security has been compromised
Read more about the individual bullets in the file from PET: Is your research at risk?
If you have questions regarding information security (or have noticed a security breach at Aarhus University) you should contact the Information Security Unit.
|
|
|
|
|
Always make sure that the physical security surrounding your computer (and additional hardware) is optimal:
-
Lock your computer when you leave it (on Windows machines this is easily done using the [Windows key] + [L]).
-
Never provide your personal AU-ID (or password) to anyone, also not staff from AU IT.
-
When logged on to your computer and briefly leaving it, do not let others use your profile.
-
Do not let others install software on your personal computer or lab machines. Regular users should not have administrator rights on computers that are shared by many.
-
Change your password regularly (not only for different systems but also your main AU-ID profile).
-
Make sure to save your files in OneDrive or the O-drive to ensure that you have a backup and an option to fast and safely restore files.
On some lab computers you may not add additional USB-equipment since this may disrupt the port-configuration and stop communication to the analytical equipment.
Read more at: https://medarbejdere.au.dk/en/informationsecurity/
|
|
|
|
|
Ransomware, spyware, unwanted encryption of discs, extraction of sensitive personal data etc. are conditions we all need to be very aware of. It is not necessarily "only" yor computer and your data that is affected. Often malware spreds to other machines or the entire network.
International guests may unintentionally carry software and vira from their home institution. You can also unknowingly pick up something and bring back home, if you visit foreign institutions. Remember the following:
-
Do not use USB sticks, especially if they belong to others (eg. guests) to transfer data between computers: Do not share USB sticks, CDs or external discs with other people. Choose to transfer electronically (through e-mail, shares, online file-sharing etc.).
-
A single visit to a website may be enough: Be careful with online links that you do not trust, or pages that look suspicious.
-
Avoid free applications from the internet: It often contains unwanted elements such as spyware. Spyware can either intercept sensitive personal information or monitor your behavior, which will influence the performance of your machine (it works slower, whereby network usage typically feels much slower).
|
|
|
|
E-mail: DMARC and spoofing
|
|
|
|
|
Starting in September AU IT will roll out DMARC, a new technical solution to mitigate spoofing attacks against staff. DMARC will ensure that fraudulent emails from senders claiming to be from Aarhus University are rejected before ever reaching your inbox.
During the implementation phase, for a brief period you will need to pay extra attention to whether emails end up in your spam filter by mistake. Until the solution has been fully implemented, the system may reject genuine emails if they have been sent from a system. For example, newsletters and confirmation emails from booking systems.
DMARC only protects your inbox against fraudulent emails that claim to be from Aarhus University. You still have to keep an eye out for any signs of spoofing from other organisations and companies, as well as for phishing emails in general.
Contact IT support if you have any questions.
FACTS
-
Spoofing is fake e-mails in which the sender pretends to be from an organisation you know. Spoofing is related to phishing. Click here to read about the typical characteristics of phishing emails.
-
DMARC stands for Domain-based Message Authentification, Reporting and Confirmation, and it is an email authentication system.
-
This protects an organisation’s domain against spoofing, phishing and other cyber attacks, for example.
-
DMARC is based on the widely used verification techniques SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail).
-
DMARC is recommended by the Centre for Cyber Security (CFCS).
|
|
|
|
31 October blackboard shuts down
|
|
|
|
The IT committee has a new member
|
|
|
|
|
From October 2021 Pradip Kumar will join the IT committee.
The committee consits of the following members:
-
Charlotte Rasmussen (chair)
-
Thomas Lund Hansen
-
Pradip Kumar
We encourage everyone to provide input: Contact any of us if you experience IT problems, or you require a specific subject to be discussed within the IT committee.
|
|
|
|