Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Search results
When sending emails to recipients outside of the University from your staff or generic email account (@chi.ac.uk), it is sometimes difficult to determine if these emails are being accessed using a secure method. This is particularly important when the information being sent includes personal...
We tend to think of social media like real life. We have a conversation or a thought and then move on – forgetting that in the digital world a copy could be kept forever, unless we take steps to remove it. This guide explains how to minimise any potential damage your previous use of social media...
In the past when sending emails containing personal data or sensitive information to recipients both inside and outside of the University from your staff or generic email account (@chi.ac.uk), there were no controls regarding where this email could go. It could be forwarded and the contents...
Different methods have been made available to students and staff which allow you to report emails which are considered as either Spam or Phishing.
Spam or Junk emails are often classed as unsolicited emails which may focus on advertising and selling goods or services. You may have never...