Data Security

  • Backups: Brandon University automatically makes a backup of data you save on the network drives such as N: or T:. This data is accessible as you move from one computer to another. However this does not include any data you save directly to a USB or even the C: drive on a computer. Nor does it currently include the desktop folder you see when using a computer (that is part of C:). Therefore any data saved on C: or external hard drives has the potential for being lost.
    • Exception: For students using student lab computers, their document folder, desktop, and pictures folder are backed up. But this doesn’t apply to staff/faculty using those devices.
  • Encryption: When we refer to Encryption here, we are referring to encryption of entire discs/drives, otherwise known as Whole-Disk-Encryption. Whole disk encryption is a process to protect all the files on your disk with an encryption key. This is useful to prevent loss of confidential information in situations such as theft or if you lost your device while on a trip. However you will need to remember the passkey, or risk losing access to the data yourself. More information contact the Brandon University Help Desk.
  • Social engineering:┬áIs a type of con game where people try to gain access to someone else’s personal information. This isn’t restricted to email and electronic devices. It can be as simple as a phone call. There are many different types of social engineering. Here are some examples:
    • Baiting: Leaving a USB stick with malware laying around, at which point an unsuspecting person finds it, decides to plug it into a computer.
    • Phishing: a method where the attacker sends an email impersonating a friend, coworker, company etc. in an attempt to get you to divulge personal information. Often contains an urgent need such as “your account will stop working” or “I’m stuck in London with no money”
    • Spearphishing: an email method similar to phishing, but personalized towards a certain group or organization.
    • Tailgating: an attacker follows a person into a restricted area while the door is open. Perhaps they hold the door open for you, or ask for the door to be held for them.