Security

Latest security threats

Click here to see the latest threats reported to the IT Service Desk.


Look out for phishing emails!

Phishing is:
Any website, online service, phone call or text message that poses as a company or brand you recognise. Any contact like this is designed to convince you to hand over valuable personal details or your money, or download something that infects your computer.

Here are some tips to spotting a phishing scam:

  • Have you been addressed by name, or does it just show your email address or say 'valued customer', 'friend' or 'colleague'? This can be a sign that the sender does not actually know you, and that it is part of a phishing scam.
  • Phishing messages often contain a link that might look correct, but will take you to a fake web site. Check the URL. Does it seem right?
  • Some phishing attacks provide links to a login page which asks for your username and password. Be extremely wary of any such links. Scammers may attempt to replicate the "look and feel" of legitimate and familiar login pages.
  • Phishing scams often contain threats. They want you to act urgently without thinking. Be suspicious of words like ‘your account will be deactivated unless...’ or 'click here to cancel your payment of $500' or 'you have been a victim of crime, click here immediately'.

Top 10 Security Tips

Stay safe online. The best defence against phishing, malware, ransomware and other online threats is awareness. The links below contain a lot of helpful security information.

Sussex is a High value target

1. Sussex is a high-value target

Cyber-criminals see you as a valuable, vulnerable target. Attacks and campaigns can be clever and persuasive. Don’t ever say “it’ll never happen to me”.
Click here to learn about the common security threats at Sussex,
or see the latest threats in the pink box on this page.


Protect Sensitive Data

2. Protect Sensitive Data

Is your data safe? Encrypt your mobile device and any sensitive data you are sharing over the internet.
Click here to learn about encryption.


Beward phishing emails and calls

3. Beware phishing emails and calls

Cyber criminals will try to convince you to give away your personal details. Look out for suspicious emails or phone calls. They might request personal information or ask for your password.
Click here to learn about phishing


Don’t leave computers or devices unlocked

4. Don’t leave computers or devices unlocked

Keep your devices physically secure, including your computer(s), phone and any data storage media (memory sticks/hard drives/CDs).
Click here to see what happens if you leave your computer unsecured.


Keep your software up-to-date

5. Keep your software up-to-date

Keep your operating systems, web browsers and other applications up-to-date to benefit from the latest security updates. Turn on automatic updates where possible.
Click here for advice about software updates.


Take care when you follow links

6. Take care when you follow links

Avoid visiting unknown websites or downloading software from untrusted sources. If attachments or links in email are unexpected or suspicious for any reason, don't click on them.
Click here for more information about spotting a fake link.


Secure your mobile device

7. Secure your mobile device

Is your phone safe? Make sure it’s locked with a password or PIN and keep this private. Update the operating system when prompted and install security software and encryption where possible.
Click here for mobile security advice.


Use strong passwords

8. Use strong passwords

Do you know how to make a genuinely secure password? Do not use the same password for multiple accounts and never share your password. Install and use a password manager.
Click here for advice about strong passwords and password managers.


Use strong passwords

9. Use anti-virus and anti-malware software

Install security software from a known and trusted source. See our list of recommended security software.
Click here for security software advice.


Back up your data

10. Back up your data

Use cloud-based systems to back up your data where possible. OneDrive and Box are provided by IT Services. If you use physical storage media, store this separately from your computer.
Click here to learn about cloud storage.

See also

Information security
Policies and guidance on how information is managed at Sussex

Passwords
Our guide to choosing and using passwords

Computing accounts
Frequently asked questions about computing accounts at Sussex

My ITS account
Login to change your password and set email options