Æ»¹ûÒùÔº

Research

Martha Crago, Vice-Principal (Research and Innovation)

Professor Martha Crago,ÌýVice-Principal (Research and Innovation), explains why Researchers should secure their Æ»¹ûÒùÔº journey.Ìý

The April 2023 Secure your journey news magazine is now available!

Access the latest Research issue here. Missed the last ones? Find them all in the Archives section of the Secure your journey blog.

Cybersecurity is essential to research at Æ»¹ûÒùÔº.

Familiarize yourself with basic security practices to protect your identity and safeguard your data.Ìý

Data is a component of ethical research. The way data is collected, stored and processed can affect the following, andÌý potentially affect your ability to research:

  • Grant approval and compliance
  • IP protection
  • Confidentiality of patients’ data

Find out more on the Research and Innovation website.

Connecting at Æ»¹ûÒùÔº

Æ»¹ûÒùÔº is a constant target of cyber attacks. Safeguard your research data and personal information with the following resources:

  • that attempt to steal your personal information.
  • Password tips:
    • that is unique to your Æ»¹ûÒùÔº account.
    • Do not share your password with anyone.
    • Do not use your Æ»¹ûÒùÔº password on external systems.
  • Enable two-factor authentication on your Æ»¹ûÒùÔº account. Two-factor authentication (2FA) is required on all Æ»¹ûÒùÔº accounts because it helps verify that you are the person who is signing into your account.Don’t delay, enroll now at
  • Keep your devices up to date:

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include:

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from Æ»¹ûÒùÔº but is not - refer to the link in the above section to learn more aboutÌýphishing scams.Ìý

For more information, the following resources are available:

Choosing the right tools for research

Æ»¹ûÒùÔº is committed to providing you with the tools you need to support your research. See the full list of Æ»¹ûÒùÔº-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.

Below are some examples of these and other solutions:

Research software and services

Collaborate, share and store:

  • : A robust suite of integrated applications, O365 offers a variety of tools enabling collaboration, data storage, videoconferencing, and more.
    • : Secure cloud-based file storage and sharing
    • : A chat-based group collaboration space enablingÌýcommunicatingÌýand information sharingÌýin a single location
  • :ÌýPrimary web-based solution used at Æ»¹ûÒùÔº to manage records or final versions of documents.
  • : Files stored on Æ»¹ûÒùÔº's network are regularly backed up and can be restored in case of accidental data loss.

Collect your data

  • Conduct interviews: Several web conferencing solutions are available to researchers.
    • : Enterprise web conferencing platformÌýfor meetings, training and events
    • : Web and audio conferencing features in addition to collaboration and file sharing capabilities
  • Surveys / forms:
    • : Allows users to create and publish surveys to a public or a private audience.
    • : Quickly and easily create quizzes, registration forms, and polls.

Securely store data

:

  • Secure cloud-based file storage and sharing solution
  • Intellectual property and personal data are protected in OneDrive's secure environment

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for Æ»¹ûÒùÔº-managed computers)

Host websites

Create and publish websites using the following Æ»¹ûÒùÔº platforms:

  • : Æ»¹ûÒùÔº's primary centrally-supported web publishing platform: a user-friendly, feature-rich, method of building and maintaining web pages.
  • : Publish independently designed websites on a centrally managed system that is secure, reliable and easily recoverable, with a reduced risk of server downtime

Use Æ»¹ûÒùÔº's research networks

Researchers at Æ»¹ûÒùÔº have access to secure networks with guaranteed high bandwidths.

Digital research services hub

Consultation and training for researchers seeking technical services and support. Visit the Digital research services website.

IT Support for research administration

Æ»¹ûÒùÔº provides IT support to administrative units that assist academics with their applications for research funds or research ethics approval. .

Acquiring software solutions

Buying new software? All storage and collaborations must be Æ»¹ûÒùÔº-approved and comply with the Æ»¹ûÒùÔº Cloud Directive - for all IT policies, see IT Policies, Regulations, Directives & Standards.

Other considerations when acquiring software:

  • Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use compliesÌýwith licensingÌýagreements.
  • The Cloud services website provides information including:
    • Cloud solution approval process
    • Types of data and what can be stored in the cloud
    • List of approved solutions at Æ»¹ûÒùÔº

Traveling for research

Use the following resources to keep your devices, research data and personal information safe while travelling.

Connecting remotely

  • : The Æ»¹ûÒùÔº VPN allows for secure communications over the Internet. You will need VPN to access Æ»¹ûÒùÔº restricted sites and resources.
  • : Access the Æ»¹ûÒùÔº network without having to plug in to a network jack.
    • : An authentication service that allows users to securely access the wireless networks of other educational institutions with the credentials they use at their home institution.
    • Use Æ»¹ûÒùÔº-provisioned services designed to provide consistent secure access globally, such as , , etc.

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for Æ»¹ûÒùÔº-managed computers)

Staying safe while working remotely

  • Working remotely: setup information, tools and resources
  • : stay safe online while you're on the move.
Ìý

Ìý

Ìý

Back to top