Skip to content

Access Right Conditions

– 1.4.2014

Everyone who that starts using/uses an OUAS user account accepts the rules of IT systems use and the following access right conditions: As I get the access rights, I guarantee that 1 § I will change the password immediately. 2 § I will not give my user account, including the password, to anyone else. I […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , ,

Operating rules for Maintenance of information systems personnel

– 25.3.2014

1. Nomination of Administrators 2. Maintenance Rule 2.1 Confidentiality 2.2 Passwords 2.3 Respect for privacy 2.4 Processing E-Mails 2.5 Handling of other files 2.6 Monitoring Directories and File Lists 2.7 Monitoring of programs, processes and operations 2.8 Processing of log data 2.9 Network load tracking and limiting transmission 1. Nomination of Administrators Maintenance of information […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students

(suomi) Numerotiedustelupalvelujen käyttö Oamkissa

– 20.3.2014

Sorry, this entry is only available in suomi.

» Read more

Published in categories: All instructions, Oamk , for Oamk staff
Tags: ,

E-mail information security

– 18.3.2014

Handling of personal information is regulated by law Information security in e-mail is weak by default So how can I protect my e-mail? 1.     Handling of personal information is regulated by law If you have to handle personal information in your work at the OUAS, it has to be done in ways approved by the Finnish […]

» Read more

Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , , , , , , , , , , ,

Ransomware blackmail programs and e-mail attachments

– 29.1.2014

In recent years, various “ransomware” type blackmail malwares are beginning to become more and more common. These programs provide a straightforward revenue for cyber criminals. Typically, a ransomware infected machine prevents the user from accessing desktop and ask for virtual money or a credit card transaction, so that the program can be rectified. So far, […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , , ,

Spear phishing

– 29.1.2014

There might pop in to your e-mail so-called spear phishing messages usually written in bad Finnish or in English. Sometimes the message content may seem very credible. Typically, in these messages IT maintenance, any authority, bank, partner, Paypal, Amazon, Google, Microsoft, UPS, DHL or other body is asking your contact information and will ask you […]

» Read more

Published in categories: All instructions, Oamk , for Oamk staff, for Oamk students
Tags: , , , , , ,