Home » Services and Admin » ICT Service » Security

Information Security

Most people are aware of the importance of information security. Below, we offer some advice on how to ensure it.


All information you work with has value

  • Think before you take it out of the office
  • Think before leaving it unattended
  • Dispose of it carefully
  • Only use authorised IT systems
  • Be careful about working on confidential information in public spaces

Update your software regularly

Many malware infections result from the exploitation of bugs in software (web browsers, operating systems, common tools, etc.). Keeping software up to date can help to keep your devices and files safe.

Regularly backup the data stored on your computer

Full data backups will save you a lot of trouble when restoring your computer. Even if you are affected by Ransomware, you will still be able to access your personal files (pictures, contact lists, etc.) from another computer. There are a number of high quality data backup solutions available (also on the internet for free).

Emailing personal information

  • Most security breaches happen because of distractions or mistakes
  • Always check email addresses, contents and attachments before you click 'Send'
  • Share appropriately

Use Anti-virus software

Install and keep Anti-virus (AV) and firewall software updated on your devices. AV can help keep your computer free of most common malware. Always check downloaded files with AV software.

Responding to today's threats

Today's attackers are much more sophisticated and organized than in the past. They often have specific financial and strategic goals. They are interested in stealing information, financial accounts, and private data - all of which they can use to generate cash on the open market or to leverage a particular business or position. 

We ask for your collaboration to promptly communicate threats.

 

Report a problem


Office hours and outside office hours visit the  EUI Helpdesk website

  • In case of phishing, just forward the email to [email protected]
  • Send an email to  [email protected] in case of major issues concerning hacking activities also during EUI closure

 

Report a cyber-crime or an online fraud


  • Contact the local police authorities when your personal devices, bank account, non-EUI email address have been involved (i.e. banking Trojan, social media accounts, identity theft, non-EUI account compromised, etc.).
  • If you are a victim of Ransomware, report it immediately to your local police and the payment processor involved (i.e. bank or credit card company). You may consult the site  No More Ransom to check whether you have been infected with one of the Ransomware variants for which there are decryption tools available free of charge.
  • Send an email to  [email protected] in case of cyber-crime or online fraud occurring in the workplace using EUI equipment and/or digital resources.

 

Phishing

The technique of phishing is used to steal users' sensitive personal information for the attacker's gain. Through fake emails, they try to fool you into revealing your passwords or credit card data or downloading a computer virus.

Protect yourself:

  • Never answer email requests for passwords, security codes, pin codes, etc.
  • Only open email attachments sent by addresses you trust
  • Be suspicious of any email that requires 'Immediate action'
  • Don't trust emails with a general address, such as 'Dear Customer' or 'Dear Sir or Madam'
  • Be suspicious of any email with grammar or spelling mistakes
  • Don't trust emails that come from someone you know, but from an unusual email address
  • Is there a link? Hover your mouse over it and discover the true destination of the link 

If you encounter a phishing attempt ... Stop. Don't click on any links. Don't open any attachments. Just forward the email to  [email protected] and we'll investigate it.

If you want to know more on this topic, contact the EUI Help Desk or your local User Support.

 

Malware

The word Malware is derived from the term 'Malicious Software'. Any piece of software that performs undesirable operations such as data theft or some other type of computer compromise can be categorised as Malware. The main types of Malware are: Trojans, Viruses, Worms, and Spyware. The symptoms caused by these different types of malware may sometimes be similar. However, they mainly differ in the way they spread and infect systems.

There are many precautions that one could adopt that will greatly increase a user's protection from a wide range of malware:

  • Since many different types of malware take advantage of OS and software vulnerabilities it is important to keep software and operating systems up to date with the latest vulnerability patches.
  • Use anti-malware and firewall software to protect your systems.
  • Keep anti-malware software up to date with the latest malware definitions.
  • Do not download files, programs, attachments, etc. when you are not sure of what the content or original source might be.
  • Only use legitimate sources of software and data. 

 

Computing Account Compromised

If you suspect that your account has been compromised because you have clicked on a link in a phishing email or your account has been blocked, please change your password immediately and report to the Help Desk.

 

Password Change

Follow the guidelines in the Strong Password Policy such as "... passwords must be 8-16 characters long and may contain only the following characters: A-Z, a-z, 0-9, ! % - _ + = [ ] { } : , . ? < > ( ) ;". 

For instructions on how to change your password, see Password Portal.

Passwords can be reset here.

 

Additional Information

 

 

Page last updated on 29 August 2018