Skip to content

Tag archive: [:fi]tietoturva[:en]computer security[:]

Information Security Guide for staff

– 21.3.2022

This Information Security Guide is primarily intended to serve as a general guide for university staff members, regardless of their place of work. It has been produced as a collaboration between universities and has been aimed at making it suitable for all universities. This Information Security Guide is the product of collaboration by the University […]

» Information Security Guide for staff
Published in categories: English version available, All instructions, Oamk , for Oamk staff, for the University of Oulu staff, accessible content, UniOulu | Tags: , , , , , , , , , , , | Leave a comment

Take care of your Microsoft 365 account – review your cloud services sign-in history

– 24.10.2019

Review your sign-in history at Azure AD My Sign-Ins. Make it a good habit and check for any unusual activity every now and then. Contact the ICT services if you notice unusual activity! The My Sign-Ins page lets you see if someone is trying to guess your password. if an attacker has successfully signed in to your […]

» Take care of your Microsoft 365 account – review your cloud services sign-in history
Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students, accessible content | Tags: , , | Leave a comment

Is your computer ok? Scan your computer to detect malware with an online virus scanner

– 30.10.2017

NB! This ESET tool will only look for possible malware, thus it will not remove any: If your computer is infected, you need to use other programs to clean it up (e.g. the ESET full version, which has a free 30 days trial.) Go to this web page: https://www.eset.com/us/home/online-scanner/ When you clock the “SCAN NOW” button, you will download […]

» Is your computer ok? Scan your computer to detect malware with an online virus scanner
Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students | Tags: , , , | Leave a comment

Prevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files

– 23.10.2017

If you get an Office document, a calendar link or another file to your email and when you are handling the file it gives you a dialog or warning prompt that looks something like this: Always answer No, just like you would do with any Office Macros. Background: Microsoft’s Dynamic Data Exchange (DDE) is an old (1987) feature of MS products (mainly […]

» Prevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files
Published in categories: English version available, Oamk , for Oamk staff, for Oamk students | Tags: , , , , | 1 comment

Security checklist

– 4.9.2015

Now, when the action is in full swing and everyone is back from the holidays, our security officer gathered this-security checklist, particularly for the staff, but it has benefits to others too: Install any software updates, including those programs that you have installed yourself. Update the mobile device operating systems and programs. Check your own […]

» Security checklist
Published in categories: English version available, All instructions, Oamk , for Oamk staff | Tags: , , , , | Leave a comment

Hola service (and similar) must not be used through OUAS IT systems or VPN servers

– 4.6.2015

Use of Hola free VPN service is prohibited in OUAS IT systems. There is serious risks when using Hola. Using Hola you disseminate other unknown Hola users telecommunication like a VPN proxy and lately there has been lots of discussion about deficiencies in data security of Hola network. Using Hola and other similar free-VPN services […]

» Hola service (and similar) must not be used through OUAS IT systems or VPN servers
Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students | Tags: , , , , | Leave a comment

E-mail information security

– 18.3.2014

Handling of personal information is regulated by law Information security in e-mail is weak by default So how can I protect my e-mail? 1.     Handling of personal information is regulated by law If you have to handle personal information in your work at the OUAS, it has to be done in ways approved by the Finnish […]

» E-mail information security
Published in categories: English version available, All instructions, Oamk , for Oamk staff, for Oamk students | Tags: , , , , , , , , , , , | Leave a comment

PDF

– 5.4.2011

Adobe Acrobat PDF – Portable Document Format PDF is a common document format used widely in the web. Also many documents at web pages by OUAS are available in PDF. PDF files are typically meant for delivering printable documents with a strict layout. PDF files are used widely and PDF readers work at least on […]

» PDF
Published in categories: English version available, All instructions, for Oamk staff, for Oamk students | Tags: , , | Leave a comment