Information Security

Frequently Asked Questions (FAQ)

Information Security's most Frequently Asked Questions.

How do I report a suspicious email?

The best way to report a suspected phishing email is to send it as an attachment to where it can be collated with any other reports of the same attack. 

This preserves the email headers and gives us a better chance of stopping any further attempts to propagate the email.

Please do not send a screenshot or forwarded copy of the email, as it does not give us this data.


How do I encrypt my laptop?

Encrypting your device is a great way to protect your data if the device is stolen. We have several quick guides on how to facilitate this:


How do I install an antimalware? Is there an antimalware tool I can get from the University?

The university does not provide antimalware for unsupported machines.

For more information on malware please refer to:


Where can I find the Information Security Policy?

The Information Security Policy and Computing Regulations can both be accessed from the Information Security webpages:

For information on Data Protection and the General Data Protection Regulation, Records Management host information on their own pages:


How do I register for Information Security Essentials training in LEARN?

The guide for how to sign up for Information Security Essentials can be found at:


How can I detect phishing/scam emails?

Ask yourself the following questions when you receive an unsolicited email:

  • Am I expecting an email from this person?
  • Do any links go where I am expecting them to? (hold your mouse over them and examine the actual destination)
  • Do I know how the sender is likely to have obtained my details?
  • Is the email written and formatted correctly for who it claims to be from?
  • Is it asking me to share information the recipient should already have or doesn’t need to know?

For further information see:


What can I use to encrypt an individual file/folder?

There are a number of programs you can use to encrypt at the folder/file level. The ones available on the supported desktops and laptops here at the University are 7Zip for Windows, iZip for Mac and Veracrypt.