News: Security Awareness
Cyber Security Reporting Obligations
New cyber security obligations reinforce the need for speedy reporting of cyber incidents.  The ×îÐÂÌÇÐÄVlog is now subject to statutory notification timeframes - in some circumstances within 12 hours of an actual or potential breach being noticed by a system user. Incidents should be immediately reported to the ×îÐÂÌÇÐÄVlog’s Cybersecurity team using this form.
IT Acceptable Use and Security Policy
The revised IT Acceptable Use and Security Policy has been approved by the Vice-Chancellor. By observing the acceptable use and security requirements, ×îÐÂÌÇÐÄVlog IT users and custodians can help to prevent service disruptions and data breaches caused by cyberattacks and other threats.
Keeping your data and systems safe
New ways to protect ×îÐÂÌÇÐÄVlog systems and information coming soon: Global Protect virtual private network and multi-factor authentication of HR systems
Reminder to use unique passwords
Data breaches have become common with increased sophistication and volume of cyberattacks, and could affect you!
Urgent advice to update your iPhone software
Security researchers have released information on critical vulnerabilities affecting all iOS versions before 12.1.4 and all iPhones.
[Read more about Urgent advice to update your iPhone software]
Increased 'phishing' attempts
Recent reports of a notable increase in ‘phishing' attempts in the education sector, together with news that the ×îÐÂÌÇÐÄVlogn National ×îÐÂÌÇÐÄVlog has recently discovered a 2018 data breach, provide a timely reminder of the importance of data security.
Simulated phishing - baseline phase completed with prizes
Following on from the Chief Information Officer Bev McQuade’s email back in June 2017, simulated phishing emails were sent out to all staff between August 2017 and January 2018. They were intended to help us objectively gauge the vulnerability of the ×îÐÂÌÇÐÄVlog, as well as deliver ‘just-in-time’ learning in order to build awareness of the various types of online phishing situations.
[Read more about Simulated phishing - baseline phase completed with prizes]