Information Security

Frequently Asked Questions (FAQ)

Information Security's most Frequently Asked Questions.

How do I report a suspicious email?

If you receive a suspicious email at work that encourages you to click a link or open an attachment, you can report it with the following process:

  1. On the email itself, next to the ‘Forward’ button, you have the option to “forward as an attachment” click this.
  2. Send this to is.helpline@ed.ac.uk
  3. You will receive an automated email back with guidance on what to do if you have clicked a link or opened an attachment from the suspicious email.

Doing this helps to collate any phishing items with other reports of the same attack. 

Please do not send a screenshot or forwarded copy of the email, as it does not give us this data.

 

How do I encrypt my laptop?

Encrypting your device is a great way to protect your data if the device is stolen. We have several quick guides on how to facilitate this:

https://www.ed.ac.uk/infosec/how-to-protect/encrypting/encrypting-computer-laptop

 

How do I install an antimalware? Is there an antimalware tool I can get from the University?

The university does not provide antimalware for unsupported machines.

For more information on malware please refer to:

https://www.ed.ac.uk/infosec/how-to-protect/anti-virus

 

Where can I find the Information Security Policy?

The Information Security Policy and Computing Regulations can both be accessed from the Information Security webpages:

https://www.ed.ac.uk/infosec/information-protection-policies/information-security-required-reading

For information on Data Protection and the UK General Data Protection Regulation, please see the data protection pages:

 https://www.ed.ac.uk/data-protection

 

How do I register for Information Security Essentials training in LEARN?

The guide for how to sign up for Information Security Essentials can be found at:

https://www.ed.ac.uk/infosec/training

 

How can I detect phishing/scam emails?

Ask yourself the following questions when you receive an unsolicited email:

  • Am I expecting an email from this person?
  • Do any links go where I am expecting them to? (hold your mouse over them and examine the actual destination)
  • Do I know how the sender is likely to have obtained my details?
  • Is the email written and formatted correctly for who it claims to be from?
  • Is it asking me to share information the recipient should already have or doesn’t need to know?

For further information see:

https://www.ed.ac.uk/infosec/how-to-protect/think-before-click

 

How do I recycle old devices?

Please see the Waste Services webpages for this information.

What can I use to encrypt an individual file/folder?

There are a number of programs you can use to encrypt at the folder/file level. The ones available on the supported desktops and laptops here at the University are 7Zip for Windows, iZip for Mac and Veracrypt.

https://www.ed.ac.uk/infosec/how-to-protect/encrypting/encrypted-containers