Information Security

Frequently Asked Questions (FAQ)

Information Security's most Frequently Asked Questions.

How do I report a suspicious email?

If you receive a suspicious email at work that encourages you to click a link or open an attachment, you can report it with the following process:

  1. On the email itself, next to the ‘Forward’ button, you have the option to “forward as an attachment” click this.
  2. Send this to
  3. You will receive an automated email back with guidance on what to do if you have clicked a link or opened an attachment from the suspicious email.

Doing this helps to collate any phishing items with other reports of the same attack. 

Please do not send a screenshot or forwarded copy of the email, as it does not give us this data.


How do I encrypt my laptop?

Encrypting your device is a great way to protect your data if the device is stolen. We have several quick guides on how to facilitate this:


How do I install an antimalware? Is there an antimalware tool I can get from the University?

The university does not provide antimalware for unsupported machines.

For more information on malware please refer to:


Where can I find the Information Security Policy?

The Information Security Policy and Computing Regulations can both be accessed from the Information Security webpages:

For information on Data Protection and the UK General Data Protection Regulation, please see the data protection pages:


How do I register for Information Security Essentials training in LEARN?

The guide for how to sign up for Information Security Essentials can be found at:


How can I detect phishing/scam emails?

Ask yourself the following questions when you receive an unsolicited email:

  • Am I expecting an email from this person?
  • Do any links go where I am expecting them to? (hold your mouse over them and examine the actual destination)
  • Do I know how the sender is likely to have obtained my details?
  • Is the email written and formatted correctly for who it claims to be from?
  • Is it asking me to share information the recipient should already have or doesn’t need to know?

For further information see:


How do I recycle old devices?

Please see the Waste Services webpages for this information.

What can I use to encrypt an individual file/folder?

There are a number of programs you can use to encrypt at the folder/file level. The ones available on the supported desktops and laptops here at the University are 7Zip for Windows, iZip for Mac and Veracrypt.