Information Security
  • slideshow image

    Don't make it this easy for internet criminals:

    Don't make it this easy for internet criminals

  • slideshow image

    Don't get bit: Never email your username and password to an email request

  • slideshow image

    If it sounds too good to be true, it usually is:

    If it sounds too good to be true, it usually is

Cybersmart

Cybersmart

Information Security at Western

Western University is committed to providing an environment that protects the privacy and security of information and electronic resources necessary to support our mission of teaching and research. We expect and rely on all individuals, authorized to access Campus information resources, to contribute to and cooperate with our protection standards.

Within these pages you will find nessessary information about our privacy and security policies including;  practicing cyber self-defense, available security tools,  potential security danger signs, reporting unusual behaviors, and steps for  corrective action. Together we can keep our campus an open, accessible system.

  • 1prevtPrevention

    Avoid the risk of unwelcome circumstance: Be aware of known vulnerabilities to your device and implementing measures to safeguard your data.
  • 1detectSecure Computing

  • Proactive analysis and recognition of threats:  Software, tools and techniques that can be put in place that will actively defend your device from harm.
  • 1igInformation Governance

    Procedures and Guidelines that focus on the protection of information and information systems across the University.



Last updated on and Powered by Cascade Server