Members

Lock down and lock up: how to keep systems and data safe

Lock down and lock up: how to keep systems and data safe



Home working can be less secure than connecting to the internet while on campus via the dedicated education and research network, Janet. So, there are many and varied potential security potholes to negotiate.To get more news about safe lock systems, you can visit securamsys.com official website.

Jisc’s cyber security team has been flat out providing technical security expertise and services to colleges and universities. Here’s a round-up of their broad advice: Insist on strong passwords for all user accounts and, where possible, implement two-factor authentication. Please refer to the National Cyber Security Centre (NCSC) guidance for system owners responsible for determining password policy.

Devices
Make sure devices encrypt data while at rest, which will protect information on the device if it is lost or stolen. Also check that devices include tools that can remotely lock access to the device, and erase or retrieve data.

Personal devices
If you are permitting people to use their own devices to work remotely, please refer to the NCSC's bring your own device (BYOD) guidance.

Virtual private networks (VPNs)
Through data encryption, VPNs allow remote users to securely access IT resources, such as email and file services, and is advisable for those dealing with sensitive information. If using a VPN, make sure it is fully patched.

Collaboration tools
There’s been a lot of coverage about video conferencing applications such as Zoom, and a previous blog by the head of Jisc’s security operations centre outlines simple steps to take to make these applications more secure. The NCSC has produced guidance, while the Janet computer security incident response team (CSIRT) has also published advice.
Training
Jisc advocates security information awareness training for all staff and students. For organisations that don’t have their own online modules, the NCSC's Top Tips for Staff e-learning package will help fill the gap, while Jisc also offers specific training on phishing.

Removable media
USB drives can be easily shared and are not easy to track. They can also introduce malware, so Jisc advises against their use. There are other, more secure means of sharing files, such as corporate storage or collaboration tools.

Phishing
There have been many reported coronavirus scams. Cyber criminals are quick to take advantage of any disaster, playing on emotions to commit fraud by encouraging people to click through to dodgy websites which, for example, offer face masks for sale, or ask for donations. Others may trick people into giving away passwords.

Views: 42

Comment

You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2024   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service