In this guide, you will find instructions about cybersecurity.
HTML Wrap | ||
---|---|---|
| ||
University cyber security starts with the behavior of every member of the university.
In these conflict-filled times, we all need to be prepared for various cyber scams and cyber attacks.
The main recommendations for cybersecurity are:
- Do not open unknown links and attachments in e-mails and SMS messages. If in doubt, always ask for advice through Computer Support first.
- Do not believe letters, messages or phone calls from unknown senders that threaten and demand urgent action. Be aware that in addition to the sender's e-mail address, the caller's phone number can also be faked these days.
- Do not give an unknown caller or unknown person access to your computer. Never enter PIN codes for your digital signature unless you have initiated this activity yourself.
- Always use different passwords in different environments and change those passwords as soon as there is any suspicion that it has become known or leaked. Always use two-factor authentication when possible to protect your account.
- Make sure you are using reliable and up-to-date software on your computer and that all security updates are installed.
- Report the cyber incident to Arvutiab as soon as possible.
You can find more detailed tips in the guides below
Guides
Expand | ||
---|---|---|
|
Note | ||
---|---|---|
| ||
Eestikeelse juhendi leiad siit: Küberturbejuhised. |
Table of Contents |
---|
A cybersecurity incident is an unwanted or unexpected information security event or events, which may harm the operations of the organisation or compromise data security. Report the incident as soon as possible, contacting the ITO in the following order:
|
|
|
Expand | ||
---|---|---|
|
| |
Keep informed of the rules governing the use of information systems and cybersecurity:
if necessary, consult IT Helpdesk or the chief information security officer. The State Information System Board has published recommendations for safer computer use see recommendations on the web portal https://www.itvaatlik.ee/ |
Expand | ||
---|---|---|
| ||
Ensuring data security is important and primarily depends on you:
|
In matters of data protection at the University of Tartu, consult Senior Specialist of Data Protection Terje Mäesalu:
|
Expand | ||
---|---|---|
| ||
To ensure the safety of using a work computer, follow the instructions:
|
|
Expand | ||
---|---|---|
| ||
Make sure that the personal computer is using secure and up-to-date software, update the software if necessary. Recommendations: |
|
|
|
Expand | ||
---|---|---|
| ||
The main e-mail solution of the University of Tartu is the cloud-based Microsoft Online Exchange |
. Recommendations:
|
Expand | ||
---|---|---|
| ||
The |
University of Tartu has acquired several software solutions for its members to conduct video lectures and video meetings, including Bigbluebutton, Panopto, Microsoft Teams and Zoom. |
data (for sale) to third parties |
. Security recommendations:
|
|
|
|
|
|
|
Expand | ||
---|---|---|
|
The rules for creating a password are described here: Changing user password. Recommendations:
|
Expand | ||
---|---|---|
| ||
If you see a suspicious person on the premises, find out who they are and where they want to go. If necessary, inform the UT security service of your suspicions at +372 737 5111. |
Data protection
In matters of data protection at the University of Tartu, consult Senior Specialist of Data Protection Terje Mäesalu:
- phone: +372 737 5119
- e-mail: terje.maesalu@ut.ee
Expand | ||
---|---|---|
| ||
To raise cyber security awareness:
|
Expand | ||
---|---|---|
| ||
|