Information Security
  • slideshow image

    Don't make it this easy for internet criminals:

    Don't make it this easy for internet criminals

  • slideshow image

    Don't get bit: Never email your username and password to an email request

  • slideshow image

    If it sounds too good to be true, it usually is:

    If it sounds too good to be true, it usually is

  • 1prevtPrevention

    Avoid the risk of unwelcome circumstance: Be aware of known vulnerabilities to your device and implementing measures to safeguard your data.
  • 1detectDetection

  • Proactive analysis and recognition of threats:  Software, tools and techniques that can be put in place that will actively defend your device from harm.
  • 1respResponse

  • Actions taken as a result of threat or event:  What to do when a negative event has occurred.
  • 1igInformation Governance

    Procedures and Guidelines that focus on the protection of information and information systems across the University.

Information Security at Western

Western University is committed to providing an environment that protects the privacy and security of information and electronic resources necessary to support our mission of teaching and research. We expect and rely on all individuals, authorized to access Campus information resources, to contribute to and cooperate with our protection standards.

Within these pages you will find nessessary information about our privacy and security policies including;  practicing cyber self-defense, available security tools,  potential security danger signs, reporting unusual behaviors, and steps for  corrective action. Together we can keep our campus an open, accessible system.

Last updated on and Powered by Cascade Server