Skip to main content

Cybersecurity

Cybersecurity

Protecting your account, devices, and other IT resources is an important responsibility for all members of the university community. There are a few simple steps you should take to improve your cybersecurity.

Key takeaways

An illustration of a person in a blazer looking at a blue shield icon with a white tick in the centre

Why is cybersecurity important? 

To protect sensitive data 

The university must store and protect important or sensitive information such as student records, financial information, and research data. 

To protect individuals 

We have a responsibility to protect students and staff from cyber threats like phishing, malware, and identity theft. Keeping your university assets secure is a key step in protecting your personal information. 

To protect the organisation 

Cyber-attacks can threaten more than just your emails and files: essential activities like teaching and research are powered by IT systems. According to IBM’s Cost of a Data Breach report, the global average cost of a data breach in 2023 was USD 4.45 million.

How do I report suspicious activity?

If you would like support, you should contact the IT Service Desk.

Report phishing

If you notice a suspicious email, you should report it using the report feature built into Outlook.

  1. Select the message > Report Message (in the toolbar or ribbon at the top) > Phishing

You can use Outlook on the web to report emails even if you don’t normally use the Outlook app.

  1. Right-click on the message > Report > Report phishing

Report suspicious activity on your computer

If you notice suspicious activity on your university computer, you should sign out of any online accounts and complete a full scan using Microsoft Defender.
Then, contact the IT Service Desk.

Compromised account

If you think your account might have been compromised, you should change your password at once. Then, contact the IT Service Desk.

Report a data breach

If you need to report a data breach, you should follow the guidance from Information Governance.