Keeping IT secure
Our aim is to provide support and guidance to keep staff and students proactive rather than reactive where IT security is concerned.
There is a published IT Security Policy which all Trinity staff and students are obliged to adhere to. This document and its supporting material outlines Trinity Policy as well as advising on practical ways that all members of the University can help to protect the confidentiality, availability, and integrity of Trinity information technology resources.
A short video on IT Security
What you can do
IT security incidents are reported every year and all users of the Trinity data network have a responsibility to ensure that they have taken all possible steps to keep their data secure, whether they are using Trinity-owned or privately-owned machines. If you have lost a laptop or USB key or if you have experienced another type of data breach, then this needs to be reported immediately as outlined here. For more information on what you can do please use the links on the left to find out how to protect yourself from IT security threats.
The most frequent cause of IT security incidents are phishing emails, fraudulent emails that are hoping to trick you into providing your computer account login details or other personal information. It's important that staff and students be familiar with how to recognise phishing emails and handle them appropriately.
Remember when creating a password to think about
- Length – Make your passwords long with 8 or more characters.
- Complexity – always
- have a mix of upper & lowercase characters
- include at least one numeric character OR a special character such as ! @ $ % * _ - + = ~
- but don’t include £ € : ? | space
- Obscurity – Good passwords are randomised combinations of characters, don’t use dictionary words or include part of your first name, last name or username.