Stay secure when working remotely
There are various ways to access College's network, directories, files and systems and services when working away from campuses.
Take care when using personal devices
Take extra care when using personal devices such as laptops, smartphones and tablets. Be sure to use passcodes, passwords and security settings, such as encryption and remote wiping, to reduce the potential impact of losing information.
Install up to date virus and malware protection
Using your computer without of date virus protection, or none at all, will leave you open to new threats. Make sure your personal computers and devices have virus and malware protection and that you update them regularly.
Be aware when working in public spaces
Just being around other people is enough to put information at risk. Be aware of people or cameras looking over your shoulder - type in your account details and view information with care.
Internet cafés might seem convenient but be wary of accessing sensitive information on any equipment that you do not trust. Keyboard input can be tracked by anybody else accessing the machine, through a process known as keylogging, which allows them to record all of the keys you press on the keyboard. Avoid using Internet cafés to access your College accounts and other College systems that hold sensitive or valuable data.
Even a few moments spent away from your working area is enough for somebody to have seen something they were not supposed to. You should always lock your computer when you leave it and keep any written documents out of view or in a locked container.
Back up documents regularly
Backing up your important documents and information regularly can minimise the effects of stolen data and technical failures. Your computer is not backed up by default but your Home directory (H: drive) is backed up every night, so you should store information there.
If you have to copy sensitive information to a device that you own, make sure you are complying with College policy. You should always make sure that the information retains a level of security protection and is deleted from the system as soon as it is no longer necessary for it to be there.