Information Security

Frequently Asked Questions (FAQ)

Information Security's most Frequently Asked Questions.

How do I report a suspicious email?

The best way to report a suspected phishing email is to send it as an attachment to is.helpline@ed.ac.uk where it can be collated with any other reports of the same attack. 

This preserves the email headers and gives us a better chance of stopping any further attempts to propagate the email.

Please do not send a screenshot or forwarded copy of the email, as it does not give us this data.

 

How do I encrypt my laptop?

Encrypting your device is a great way to protect your data if the device is stolen. We have several quick guides on how to facilitate this:

https://www.ed.ac.uk/infosec/how-to-protect/encrypting/encrypting-computer-laptop

 

How do I install an antimalware? Is there an antimalware tool I can get from the University?

The university does not provide antimalware for unsupported machines.

For more information on malware please refer to:

https://www.ed.ac.uk/infosec/how-to-protect/anti-virus

 

Where can I find the Information Security Policy?

The Information Security Policy and Computing Regulations can both be accessed from the Information Security webpages:

https://www.ed.ac.uk/infosec/information-protection-policies/information-security-required-reading

For information on Data Protection and the General Data Protection Regulation, Records Management host information on their own pages:

https://www.ed.ac.uk/records-management/data-protection

 

How do I register for Information Security Essentials training in LEARN?

The guide for how to sign up for Information Security Essentials can be found at:

https://www.ed.ac.uk/infosec/learning-about-protection/register-information-security-essentials

 

How can I detect phishing/scam emails?

Ask yourself the following questions when you receive an unsolicited email:

  • Am I expecting an email from this person?
  • Do any links go where I am expecting them to? (hold your mouse over them and examine the actual destination)
  • Do I know how the sender is likely to have obtained my details?
  • Is the email written and formatted correctly for who it claims to be from?
  • Is it asking me to share information the recipient should already have or doesn’t need to know?

For further information see:

https://www.ed.ac.uk/infosec/learning-about-protection/about-phishing

 

What can I use to encrypt an individual file/folder?

There are a number of programs you can use to encrypt at the folder/file level. The ones available on the supported desktops and laptops here at the University are 7Zip for Windows, iZip for Mac and Veracrypt.

https://www.ed.ac.uk/infosec/how-to-protect/encrypting/encrypted-containers