Servers

Cybersecurity for professional services staff

Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed.

We're all in this together video series

As closed as necessary

Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed. 

Cybersecurity for professional services staff

As closed as necessary

Cybersecurity for professional services staff

Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed. 

Cybersecurity for everyone at Imperial

We're all in this together

Cybersecurity for everyone at Imperial

To keep Imperial secure we need all members of our community - staff and students - to take their safety and security online seriously.

Cybersecurity for researchers, academics and their research

As open as possible

Cybersecurity for researchers, academics and their research data

We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.

These videos have been created in collaboration with Research England and our academic community using Enhancing Research Culture funding.

What can I do?

There are some key things that you can do now to secure your valuable work against cyber threats.

What can I do?

Castle with helicopter dropping package inside from above

Handle data responsibly

How you store and share the data you have access to matters. Find out more about how to responsibly handle data at Imperial

Computer with drip feed of queen liquid

Love your devices

Keeping your devices updated - university-managed and personal - is an essential part of holding would-be cyber attacks at bay.  

 

Computer with a catle gate on the screen

Choose apps wisely

Be cautious with third-party tools, and remember that you must only use GDPR-compliant services for Imperial-related work.

A ninja with sword and ICT on his balaclava

Report an incident

Cyber attacks now evolve within hours rather than days. Report suspected or real incidents as soon as possible.