Cybersecurity threats are on the rise and are becoming ever more rapid and sophisticated. You will have seen the rise in cyber attacks in the news this year, which have had significant impacts on several large organisations such as Marks and Spencer and the Co-Op.
To keep Imperial secure we need all members of our community to take their safety and security online seriously.
We're all in this together video series
We're all in this together
Cybersecurity for everyone at Imperial
To keep Imperial secure we need all members of our community - staff and students - to take their safety and security online seriously.
As open as possible
Cybersecurity for researchers, academics and their research data
We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.
As closed as necessary
Cybersecurity for professional services staff
Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed.
These videos have been created in collaboration with Research England and our academic community using Enhancing Research Culture funding.
What can I do?
If you’ve not already done so, here’s a handy guide of essential things you can do now to protect yourself from cyber threats:
What can I do?
Secure your identity
Secure your Imperial identity by setting up MFA and taking control of your passwords
- Find out how to set up Multi-Factor Authentication
- Learn more about setting strong passwords
- Change your password
Think before you click
Beware of unexpected emails, calls or messages, even from people you know, especially if they ask you to do something in a hurry
Update your devices
An updated device is a more secure device and, where possible, using a university-managed device is a safer bet
- Installing updates
- How to keep mobiles and tablets protected
- Bring your own device (coming soon)
Handle data responsibly
Use university-supported data storage and sharing platforms. Don’t depend on personal drives or third-party apps outside the university.
Report an Incident
Cyber attacks now evolve within hours rather than days. Report suspected or real incidents as soon as possible.