IT Services Secure IT Device Security
Device Security
- 黑料网
- JCU Global Experience
- International Students
- Open Day
- How to apply
- Pathways to university
- Virtual Open Day
- Living on Campus
- Courses
- Publications
- Scholarships
- Parents and Partners
- JCU Heroes Programs
- Aboriginal and Torres Strait Islander in Marine Science
- Elite Athletes
- Defence
- AI@JCU
- Current Students
- New students
- JCU Orientation
- LearnJCU
- Placements
- CEE
- Unicare Centre and Unicampus Kids
- Graduation
- Off-Campus Students
- JCU Job Ready
- Safety and Wellbeing
- JCU Prizes
- Professional Experience Placement
- Employability Edge
- Art of Academic Writing
- Art of Academic Editing
- Careers and Employability
- Student Equity and Wellbeing
- Career Ready Plan
- Careers at JCU
- Partners and Community
- Alumni
- About JCU
- Reputation and Experience
- Chancellery
- Governance
- Celebrating 50 Years
- Academy
- Indigenous Engagement
- Education Division
- Graduate Research School
- Research and Teaching
- Research Division
- Research and Innovation Services
- CASE
- College of Business, Law and Governance
- College of Healthcare Sciences
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- Anthropological Laboratory for Tropical Audiovisual Research (ALTAR)
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre (AgTAC)
- Advanced Analytical Centre
- AMHHEC
- Aquaculture Solutions
- AusAsian Mental Health Research Group
- ARCSTA
- Lions Marine Research Trust
- Australian Tropical Herbarium
- Australian Quantum & Classical Transport Physics Group
- Boating and Diving
- Clinical Psychedelic Research Lab
- Centre for Tropical Biosecurity
- Centre for Tropical Bioinformatics and Molecular Biology
- CITBA
- CMT
- Centre for Disaster Solutions
- CSTFA
- Cyclone Testing Station
- The Centre for Disaster Studies
- Daintree Rainforest Observatory
- JCU Eduquarium
- JCU Turtle Health Research
- Language and Culture Research Centre
- MARF
- Orpheus
- TESS
- JCU Ideas Lab
- TARL
- eResearch
- Indigenous Education and Research Centre
- Estate
- Work Health and Safety
- Staff
- Discover Nature at JCU
- Cyber Security Hub
- Association of Australian University Secretaries
- Services and Resources Division
- Environmental Research Complex [ERC]
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- Give to JCU
- Indigenous Legal Needs Project
- Inherent Requirements
- IsoTropics Geochemistry Lab
-
IT Services
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
-
Secure IT
- Choosing a strong Password
- Cyber Security Hub
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- Multi-Factor Authentication (MFA)
- Student Systems
- IT Service Catalog
- About
- JCU Webinars
- JCU Events
- JCU Motorsports
- JCU Sport
- Library
- Mabo Decision: 30 years on
- Marine Geophysics Laboratory
- Office of the Vice Chancellor and President
- Outstanding Alumni
- Pharmacy Full Scope
- Planning for your future
- Policy
- PAHL
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- RDIM
- Researcher Development Portal
- Roderick Centre for Australian Literature and Creative Writing
- Contextual Science for Tropical Coastal Ecosystems
- State of the Tropics
- Strategic Procurement
- Student profiles
- SWIRLnet
- TREAD
- TropEco for Staff and Students
- TQ Maths Hub
- TUDLab
- VAVS Home
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
- Pay review
Smart phones, tablets and laptops are used on a daily basis at JCU. These devices often contain information vital to the University’s teaching, learning and research initiatives and it is important they are kept secure.
Mobile Device Security
Today’s mobile devices are as powerful and connected as any desktop or laptop computer. Take the same precautions on your device as you do on your computer with regard to messaging and online safety.
DO
Keep your mobile security software, web browser, and operating system up to date, this is the best defence against viruses, malware and other online threats.
Use a strong passcode to lock your mobile device.
Review the privacy policy and understand what data (location, access to your contacts or social networks etc.) an app can access on your device, before you download or install it.
DON’T
Conduct sensitive business on your mobile device when connected to public or open Wi-Fi hotspots.
Respond to unknown texts, calls or voicemail. Just like with email, requests for personal information or for immediate action, are almost always a scam.
Security Software
No matter how careful you are, there is always the potential for security breaches on your devices. To help minimise the risk to your data good security software is essential.
DO
Apply software updates to your operating system and all other programs (preferably letting the computer manage this automatically). If the computer you are using is owned by JCU this service is provided for you.
- Microsoft has a personal firewall built into their Windows Operating System which all Windows users can make use of, there are also links to several free and trial versions of anti-virus and personal firewall software at
Install and run security software such as anti-virus, anti-spyware or a personal firewall to help protect your computer from viruses, spyware and hackers.
DON’T
Ignore prompts from your Operating System or software to install updates.
Leave trial or expired software on your computer. Un-patched software can be exploited by hackers to gain access and control of your computer.
Physical Security
Your personal computer is an essential tool for working and studying at JCU, because it contains important files including emails, passwords and other sensitive information, you should takes steps to physically protect your computer at all times.
DO
Lock or log out of your workstation when you are away from it. Locking can be set to occur after a period of inactivity.
Visually inspect devices connected to your workstation. Devices could have been installed that have the ability to compromise your security. Pay particular attention to your mouse, keyboard and network connections.
DON’T
Leave your Laptop unattended in public areas.
Leave your office unlocked when you aren’t in the room, even if you’re just heading to the bathroom. If you leave your door open, you are providing thieves easy access to your belongings.