Frequently Asked Questions (FAQ)
Information Security's most Frequently Asked Questions.
How do I report a suspicious email?
The best way to report a suspected phishing email is to send it as an attachment to email@example.com where it can be collated with any other reports of the same attack.
This preserves the email headers and gives us a better chance of stopping any further attempts to propagate the email.
Please do not send a screenshot or forwarded copy of the email, as it does not give us this data.
How do I encrypt my laptop?
Encrypting your device is a great way to protect your data if the device is stolen. We have several quick guides on how to facilitate this:
How do I install an antimalware? Is there an antimalware tool I can get from the University?
The university does not provide antimalware for unsupported machines.
For more information on malware please refer to:
Where can I find the Information Security Policy?
The Information Security Policy and Computing Regulations can both be accessed from the Information Security webpages:
For information on Data Protection and the General Data Protection Regulation, Records Management host information on their own pages:
How do I register for Information Security Essentials training in LEARN?
The guide for how to sign up for Information Security Essentials can be found at:
How can I detect phishing/scam emails?
Ask yourself the following questions when you receive an unsolicited email:
- Am I expecting an email from this person?
- Do any links go where I am expecting them to? (hold your mouse over them and examine the actual destination)
- Do I know how the sender is likely to have obtained my details?
- Is the email written and formatted correctly for who it claims to be from?
- Is it asking me to share information the recipient should already have or doesn’t need to know?
For further information see:
What can I use to encrypt an individual file/folder?
There are a number of programs you can use to encrypt at the folder/file level. The ones available on the supported desktops and laptops here at the University are 7Zip for Windows, iZip for Mac and Veracrypt.