Fieldwork and University devices
We understand that fieldwork is often an essential part of University teaching, learning and research, which inspires and enables academic and personal development.
We understand that fieldwork is often an essential part of University teaching, learning and research, which inspires and enables academic and personal development.
Security updates have been released for various Apple products to mitigate multiple vulnerabilities which could leave systems open to cyber attacks. Use this guidance to learn more about the vulnerabilities, if you’re…
Mobile phone coverage can vary, particularly inside larger buildings or rural areas. Wi-Fi calling allows you make phone calls over wireless networks (including eduroam) rather than over the 4G or 5G mobile signal.
A zero-day vulnerability has been found in Google Chrome. This means a security bug existed with no patch available, leaving systems open to cyber attacks. Use this guidance to learn more about the vulnerability, if…
Every staff member can use the file storage options provided by the University. In some cases, you may wish to backup important files. Learn what is available for you to use so you can make sensible choices when…
Although our latest blog regarding vulnerabilities in Apple was only last month, more security updates have been released for various Apple products to mitigate multiple vulnerabilities which could leave systems open…
Security updates have recently been released for various Apple products to mitigate multiple vulnerabilities which could leave systems open to cyber attacks. Use this guidance to learn more about the vulnerabilities,…
Twitter have recently announced that SMS two-factor authentication will only be offered to verified or paid accounts. Whilst there are still other forms of multi-factor authentication (MFA) that free accounts will be…
Last year, the Cybersecurity and Infrastructure Security Agency (CISA) published new guidance to raise awareness of a new threat, multi-factor authentication (MFA) fatigue, and how organisations can protect themselves…
Before you leave the University, files and resources should be made available to your team and IT kit handed back. Go through this checklist so that your team can continue to work after you leave. Some of these steps…