Read best practice and tips

Learn practical cyber security tips and best practices that will help you safeguard your personal and institutional data.

  • One researcher working with a microscope while the other person documenting on a laptop.

    November 11, 2024

    Securing your research environment is not a binary of either secure or insecure, but rather a journey of awareness and improvement determined by the amount of risk you are willing and able to accept. Small security considerations and process changes can drastically increase your ability to protect your data and identify, respond to and recover from security incidents.

  • Researchers working together to build a prototype product

    November 11, 2024

    One of the key security risks to the University identified by Information Security is attacks targeted at researchers. While many of these threats extend beyond research, the scope of research activities and the value of intellectual property increases the risk from sophisticated attacks, espionage and foreign interference.

  • Researchers studying their data on a computer monitor

    November 11, 2024

    Research information security looks to protect your research information, data, intellectual property and systems by identifying, understanding and addressing potential information and cyber risks. By considering these risks, you can reduce the potential of data loss, unauthorized knowledge transfer and agreement breaches.

  • A group of people having a discussion in the library.

    November 11, 2024

    Information Security provides advice, assistance and services related to the current and future cyber security realities of research to improve your competitiveness and productivity.

  • A group of students using digital devices in a study area.

    October 10, 2024

    We spend so much of our lives online that our digital world has a significant impact on our physical and mental well-being. By adopting secure practices, you can enhance your digital experience and enjoy peace of mind as you explore the virtual world.

  • A woman working on a data driven application.

    October 10, 2024

    We must ensure that the data in our care is not only secure but also managed with integrity and ethical considerations. Here are some actions you can take to protect data that you collect and handle within your department.

  • A group of people using social media on a mobile phone

    October 8, 2024

    Identity thieves and hackers can use what you post on social media platforms to steal your personal information, posing a risk to your privacy and online reputation. Use these tips to conduct a check-up for your social media privacy health.

  • A graphic depicting people navigating through documents on privacy policy

    September 27, 2024

    Learning how to read a privacy policy will help you make informed decisions before using services or tools that collect personal information.

  • Students collaborating in a computer lab.

    August 7, 2024

    Learn more about information security and gain practical experience without starting your education or career from scratch.