The University employs various centralised security controls on the University network to protect you and your data, however the University also relies on end-users to help keep the University secure. In support of flexible ways of working the University allows staff to utilise their personally owned device for work, this device must remain secure to maintain the security of the University network.
If you are connecting your personal computer to the campus network you are responsible for ensuring appropriate security controls are in place, the guidance on this page will help you.
The latest application and operating system updates must be installed, especially security updates.
This will help:
Create a strong password or pin, or use fingerprint or face recognition to log in to your device.
Passwords should be at least 9 characters long and contain lower case, upper case, and numbers. Passwords can be created using the following site:
Reusing passwords is risky because a compromised password for one account can lead to the compromise of other accounts where that password has been reused.
In order to avoid having to remember a number of differnt passwords, we recommend using a password manager. There are free tools available for personal use.
For University system or shared credentials (excluding FAN and personal accounts), users can get access to PasswordState. Please contact the IDS helpdesk for an account.
A virus can be embedded in a file on a USB device or can be infected during the manufacturing or supply chain process if quality control measure are not adequate. USB devices are useful but stay away from random ones.
Malicious websites can install harmful malware onto your computer or web browser, the following guidelines will help keep you secure.
Opening hours: 8am to 5.30pm, Monday to Friday, excluding public holidays
After hours or when all staff are busy you will be given an option to leave a voicemail message. Voicemails will be accessed as soon as practical during business hours otherwise you may choose to log an IT support request.
You consent to the use of our cookies if you proceed.