• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

A Guide to Data Protection in HSE University’s Digital Ecosystem

@freepik

HSE University is constantly improving its digital ecosystem. However, as the system becomes more developed, the requirements for information security become higher. All HSE employees who use the university’s information systems and services must take appropriate steps to safeguard against personal data theft, information tampering, and the theft and misuse of login credentials.

To that end, the team at the HSE Centre for Information Security has created the following Guide to Ensuring Cybersecurity Measures.

Software Security

Malware is software designed to disrupt computer systems, gain unauthorised access to information and systems, leak private information, and interfere with computer security and privacy.

You can safeguard against malicious software by observing the following precautions:

  • Use only licensed software and ensure that any software and operating systems are always up to date.
  • Do not use administrator rights unless necessary and do not use remote administration tools on a device intended for accessing HSE University information systems.
  • Keep your antivirus software up to date. It is recommended to set the default security policy level to the maximum so that any infected files are deleted automatically.
  • Set your antivirus software to start automatically when the operating system boots.
  • Scan all information and files received for viruses and run a full security scan of your computer at least once a week.
  • Do not use any HSE University information systems if you suspect that your computer has been infected with a virus (eg, experiencing unexpected freezes, reboots, or unusual network activity)

Suspicious Emails

Malware is commonly transmitted through email attachments and suspicious links.

To avoid falling victim to malware, make sure that you:

  • Do not open emails or attachments from unknown senders, and do not click on the links contained in such emails.
  • Always check the sender’s address before viewing an email. Scammers can use email addresses that are very similar to real corporate addresses.
  • Read the text of emails carefully and check for spelling and grammatical errors. Messages containing errors, words in a foreign language, or special characters may be from scammers.
  • Remain calm when dealing with emails. Many scam emails contain calls for immediate action, attempting to trick you into acting quickly and rashly.
  • Analyse links carefully, as scam links can look very similar to real ones. If a link looks suspicious or does not meet security requirements (for example, it starts with http:// instead of https://), do not click it.
  • Limit your online information exchange to reliable information portals and verified email correspondents.
  • When using online public communications networks on your computer, make sure to use only trustworthy resources, do not install unrelated third-party programs, and refrain from accessing non work-related sites that may be used to spread viruses (eg social networks, gaming and dating sites, sites that distribute software, music, films, etc).
  • Do not allow any unauthorised persons to install programs on your computer.

Passwords

Keep all your passwords confidential and make sure they cannot be accessed by anyone else. If you suspect that your password has been compromised in any way, you need to change it immediately.

Remember:

  • Your password must be at least 12 characters long and use a combination of lowercase and uppercase letters, numbers, and symbols.
  • Do note write down your login and password and leave them where they can be accessed by unauthorised persons.

Data Processing Security

When processing data in HSE information systems, use a dedicated computer that is not intended for any other activity. Take all necessary measures to ensure that unauthorised persons cannot physically access your work computer. Make sure that no third parties can access your computer or make unauthorised software and hardware configuration changes.

When working with university information systems, please:

  • Do not send unencrypted files containing confidential information by email or using social network messengers. To send such files safely, please use storage resources provided by the university (eg cloud data storage services).
  • Shut down all university information systems properly using the corresponding menu item.
  • Do not use your HSE University login credentials on any other online public resources.

Mobile Devices

Scammers can also gain access to confidential and personal data through your mobile phone.

Please take the following measures to ensure mobile phone data security:

  • If your phone is lost or stolen, block the SIM card if you receive any notification confirming your login to HSE University’s information systems. Do the same if a mobile application for working with HSE University’s information systems is installed on the phone and the credentials have been saved in the application.
  • Set a password on your phone and do not leave it unattended.
  • When installing apps on your phone, pay attention to the permissions required. Be wary if an app requires excessive permissions. Pay particular attention to apps that request dangerous permissions such as accessing and sending SMS messages or accessing the internet.
  • Install antivirus software on your phone and keep it up to date.
  • Do not hack your phone—this disables the security mechanisms provided by the manufacturer and makes your phone vulnerable to viruses.

Ensuring information security is everyone’s responsibility. If you have any questions, you can contact the HSE Hotline to receive answers and information as quickly as possible.

November 03, 2023
IT