This Information Security Guide is primarily intended to serve as a general guide for university staff members, regardless of their place of work. It has been produced as a collaboration between universities and has been aimed at making it suitable for all universities. This Information Security Guide is the product of collaboration by the University […]
» Information Security Guide for staffTag archive: [:fi]tietoturva[:en]computer security[:]
Information Security Guide for staff
– 21.3.2022
Take care of your Microsoft 365 account – review your cloud services sign-in history
– 24.10.2019
Review your sign-in history at Azure AD My Sign-Ins. Make it a good habit and check for any unusual activity every now and then. Contact the ICT services if you notice unusual activity! The My Sign-Ins page lets you see if someone is trying to guess your password. if an attacker has successfully signed in to your […]
» Take care of your Microsoft 365 account – review your cloud services sign-in historyIs your computer ok? Scan your computer to detect malware with an online virus scanner
– 30.10.2017
NB! This ESET tool will only look for possible malware, thus it will not remove any: If your computer is infected, you need to use other programs to clean it up (e.g. the ESET full version, which has a free 30 days trial.) Go to this web page: https://www.eset.com/us/home/online-scanner/ When you clock the “SCAN NOW” button, you will download […]
» Is your computer ok? Scan your computer to detect malware with an online virus scannerPrevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files
– 23.10.2017
If you get an Office document, a calendar link or another file to your email and when you are handling the file it gives you a dialog or warning prompt that looks something like this: Always answer No, just like you would do with any Office Macros. Background: Microsoft’s Dynamic Data Exchange (DDE) is an old (1987) feature of MS products (mainly […]
» Prevent ransomware attacks targeted at users of Microsoft products (e.g. Excel, Outlook, Word) by answering No in a dialog that asks for permission to use data from linked files(suomi) Kiristyshaittaohjelma TeslaCrypt leviää sähköpostitse: älä avaa mitä tahansa sähköpostiliitteitä!
– 3.12.2015
Sorry, this entry is only available in suomi.
» (suomi) Kiristyshaittaohjelma TeslaCrypt leviää sähköpostitse: älä avaa mitä tahansa sähköpostiliitteitä!Security checklist
– 4.9.2015
Now, when the action is in full swing and everyone is back from the holidays, our security officer gathered this-security checklist, particularly for the staff, but it has benefits to others too: Install any software updates, including those programs that you have installed yourself. Update the mobile device operating systems and programs. Check your own […]
» Security checklistHola service (and similar) must not be used through OUAS IT systems or VPN servers
– 4.6.2015
Use of Hola free VPN service is prohibited in OUAS IT systems. There is serious risks when using Hola. Using Hola you disseminate other unknown Hola users telecommunication like a VPN proxy and lately there has been lots of discussion about deficiencies in data security of Hola network. Using Hola and other similar free-VPN services […]
» Hola service (and similar) must not be used through OUAS IT systems or VPN serversE-mail information security
– 18.3.2014
Handling of personal information is regulated by law Information security in e-mail is weak by default So how can I protect my e-mail? 1. Handling of personal information is regulated by law If you have to handle personal information in your work at the OUAS, it has to be done in ways approved by the Finnish […]
» E-mail information security– 5.4.2011
Adobe Acrobat PDF – Portable Document Format PDF is a common document format used widely in the web. Also many documents at web pages by OUAS are available in PDF. PDF files are typically meant for delivering printable documents with a strict layout. PDF files are used widely and PDF readers work at least on […]
» PDF