A cybersecurity incident is an unwanted or unexpected information security event or events, which may harm the operations of the organisation or compromise data security. Report the incident as soon as possible, contacting the ITO in the following order:
During non-working hours, contact the ITO based on the cyber security emergency instruction (see below). |
Keep informed of the rules governing the use of information systems and cybersecurity:
|
Ensuring data security is important and primarily depends on you:
|
To ensure the safety of using a work computer, follow the instructions:
|
Make sure that the personal computer is using secure and up-to-date software, update the software if necessary. Recommendations:
|
The main e-mail solution of the University of Tartu is the cloud-based Microsoft Online Exchange and the related application Outlook. Recommendations:
|
The cloud-based service uses third-party hardware and software and service is provided to end users under a contract or partnership agreement. Many free services contain advertisements or transfer personal information for sale to third parties. Many video conferencing and video lecture solutions are still under development and often contain security flaws. Software is being developed, but older versions may contain dangerous security issues that have been exploited by malicious people. Counterfeit software packages based on a number of well-known software programs, which contain malware added by criminals in addition to the original software, have become widespread on the Internet. Security recommendations:
|
The rules for creating a password are described here: Changing user password. Recommendations:
|
If you see a suspicious person on the premises, find out who they are and where they want to go. If necessary, inform the UT security service of your suspicions at +372 737 5111. |
In matters of data protection at the University of Tartu, consult Senior Specialist of Data Protection Terje Mäesalu:
|
To raise cyber security awareness:
|