This Information Security Guide is primarily intended to serve as a general guide for university staff members, regardless of their place of work. It has been produced as a collaboration between universities and has been aimed at making it suitable for all universities. This Information Security Guide is the product of collaboration by the University […]» Information Security Guide for staff
Tag archive: [:fi]tietoturva[:en]computer security[:]
(suomi) Microsoft on lopettanut Windows 7 tuen 14.1.2020, eli nyt on viimeistään aika päivittää kotikoneiden käyttikset, jos sattuu olemaan vielä Windows 7 käytössä
Sorry, this entry is only available in Finnish.» (suomi) Microsoft on lopettanut Windows 7 tuen 14.1.2020, eli nyt on viimeistään aika päivittää kotikoneiden käyttikset, jos sattuu olemaan vielä Windows 7 käytössä
Review your sign-in history at Azure AD My Sign-Ins. Make it a good habit and check for any unusual activity every now and then. Contact the ICT services if you notice unusual activity! The My Sign-Ins page lets you see if someone is trying to guess your password. if an attacker has successfully signed in to your […]» Take care of your Microsoft 365 account – review your cloud services sign-in history
NB! This ESET tool will only look for possible malware, thus it will not remove any: If your computer is infected, you need to use other programs to clean it up (e.g. the ESET full version, which has a free 30 days trial.) Go to this web page: https://www.eset.com/us/home/online-scanner/ When you clock the “SCAN NOW” button, you will download […]» Is your computer ok? Scan your computer to detect malware with an online virus scanner
Prevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files
If you get an Office document, a calendar link or another file to your email and when you are handling the file it gives you a dialog or warning prompt that looks something like this: Always answer No, just like you would do with any Office Macros. Background: Microsoft’s Dynamic Data Exchange (DDE) is an old (1987) feature of MS products (mainly […]» Prevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files
(suomi) Kiristyshaittaohjelma TeslaCrypt leviää sähköpostitse: älä avaa mitä tahansa sähköpostiliitteitä!
Sorry, this entry is only available in Finnish.» (suomi) Kiristyshaittaohjelma TeslaCrypt leviää sähköpostitse: älä avaa mitä tahansa sähköpostiliitteitä!
Now, when the action is in full swing and everyone is back from the holidays, our security officer gathered this-security checklist, particularly for the staff, but it has benefits to others too: Install any software updates, including those programs that you have installed yourself. Update the mobile device operating systems and programs. Check your own […]» Security checklist
Use of Hola free VPN service is prohibited in OUAS IT systems. There is serious risks when using Hola. Using Hola you disseminate other unknown Hola users telecommunication like a VPN proxy and lately there has been lots of discussion about deficiencies in data security of Hola network. Using Hola and other similar free-VPN services […]» Hola service (and similar) must not be used through OUAS IT systems or VPN servers
Handling of personal information is regulated by law Information security in e-mail is weak by default So how can I protect my e-mail? 1. Handling of personal information is regulated by law If you have to handle personal information in your work at the OUAS, it has to be done in ways approved by the Finnish […]» E-mail information security
Adobe Acrobat PDF – Portable Document Format PDF is a common document format used widely in the web. Also many documents at web pages by OUAS are available in PDF. PDF files are typically meant for delivering printable documents with a strict layout. PDF files are used widely and PDF readers work at least on […]» PDF