Data Security

  • Backups: Brandon University automatically makes a backup of data you save on the network drives such as N: or T:. This data is accessible as you move from one computer to another.  However this does not include any data you save directly to a USB drive or even the C: drive on a computer. Nor does it currently include the desktop folder you see when using a computer (that is part of C:). Therefore any data saved on C: or external hard drives has the potential for being lost.
    • Cloud Storage: We also use cloud storage solutions (such as OneDrive & Teams) which can be setup to make backups of certain folders/files including an option to backup your Desktop folder, the documents folder, and pictures folder on your C: drive. These have the added benefits of being more easily shared, and recovered by yourself if deleted by mistake.  Ask the Helpdesk for assistance in setting this up for your devices. Or view the self help solutions at:
  • Encryption: When we refer to Encryption here, we are referring to encryption of entire discs/drives, otherwise known as Whole-Disk-Encryption. Whole disk encryption is a process to protect all the files on your disk with an encryption key. This is useful to prevent loss of confidential information in situations such as theft or if you lost your device while on a trip. However you will need to remember the passkey, or risk losing access to the data yourself. More information contact the Brandon University Help Desk.
  • Social engineering: Is a type of con game where people try to gain access to someone else’s personal information. This isn’t restricted to email and electronic devices. It can be as simple as a phone call. There are many different types of social engineering. Here are some examples:
    • Baiting: Leaving a USB stick with malware laying around, at which point an unsuspecting person finds it, decides to plug it into a computer.
    • Phishing: a method where the attacker sends an email impersonating a friend, coworker, company etc. in an attempt to get you to divulge personal information. Often contains an urgent need such as “your account will stop working” or “I’m stuck in London with no money”
    • Spearphishing: an email method similar to phishing, but personalized towards a certain group or organization.
    • Tailgating: an attacker follows a person into a restricted area while the door is open. Perhaps they hold the door open for you, or ask for the door to be held for them.


Please visit the Get Cyber Safe Protect your Devices website for more information.