ƽÌØÎå²»ÖÐ

Research

Martha Crago, Vice-Principal (Research and Innovation)

Professor Martha Crago,ÌýVice-Principal (Research and Innovation), explains why Researchers should secure their ƽÌØÎå²»ÖÐ journey.Ìý

The April 2023 Secure your journey news magazine is now available!

Access the latest Research issue here. Missed the last ones? Find them all in the Archives section of the Secure your journey blog.

Cybersecurity is essential to research at ƽÌØÎå²»ÖÐ.

Familiarize yourself with basic security practices to protect your identity and safeguard your data.Ìý

Data is a component of ethical research. The way data is collected, stored and processed can affect the following, andÌý potentially affect your ability to research:

  • Grant approval and compliance
  • IP protection
  • Confidentiality of patients’ data

Find out more on the Research and Innovation website.

Connecting at ƽÌØÎå²»ÖÐ

ƽÌØÎå²»ÖÐ is a constant target of cyber attacks. Safeguard your research data and personal information with the following resources:

  • that attempt to steal your personal information.
  • Password tips:
    • that is unique to your ƽÌØÎå²»ÖÐ account.
    • Do not share your password with anyone.
    • Do not use your ƽÌØÎå²»ÖÐ password on external systems.
  • Enable two-factor authentication on your ƽÌØÎå²»ÖÐ account. Two-factor authentication (2FA) is required on all ƽÌØÎå²»ÖÐ accounts because it helps verify that you are the person who is signing into your account.Don’t delay, enroll now at
  • Keep your devices up to date:

Prevent fraud

Be aware that hackers often study an organization, learn its financial approval processes, and target approvers. Some signs of attempted fraud may include:

  • An urgent email asking you to approve a request without going through the standard process
  • The email address of a message appears to be from ƽÌØÎå²»ÖÐ but is not - refer to the link in the above section to learn more aboutÌýphishing scams.Ìý

For more information, the following resources are available:

Choosing the right tools for research

ƽÌØÎå²»ÖÐ is committed to providing you with the tools you need to support your research. See the full list of ƽÌØÎå²»ÖÐ-approved cloud services for software supporting secure data storage, file sharing, publishing and collaboration.

Below are some examples of these and other solutions:

Research software and services

Collaborate, share and store:

  • : A robust suite of integrated applications, O365 offers a variety of tools enabling collaboration, data storage, videoconferencing, and more.
    • : Secure cloud-based file storage and sharing
    • : A chat-based group collaboration space enablingÌýcommunicatingÌýand information sharingÌýin a single location
  • :ÌýPrimary web-based solution used at ƽÌØÎå²»ÖÐ to manage records or final versions of documents.
  • : Files stored on ƽÌØÎå²»ÖÐ's network are regularly backed up and can be restored in case of accidental data loss.

Collect your data

  • Conduct interviews: Several web conferencing solutions are available to researchers.
    • : Enterprise web conferencing platformÌýfor meetings, training and events
    • : Web and audio conferencing features in addition to collaboration and file sharing capabilities
  • Surveys / forms:
    • : Allows users to create and publish surveys to a public or a private audience.
    • : Quickly and easily create quizzes, registration forms, and polls.

Securely store data

:

  • Secure cloud-based file storage and sharing solution
  • Intellectual property and personal data are protected in OneDrive's secure environment

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for ƽÌØÎå²»ÖÐ-managed computers)

Host websites

Create and publish websites using the following ƽÌØÎå²»ÖÐ platforms:

  • : ƽÌØÎå²»ÖÐ's primary centrally-supported web publishing platform: a user-friendly, feature-rich, method of building and maintaining web pages.
  • : Publish independently designed websites on a centrally managed system that is secure, reliable and easily recoverable, with a reduced risk of server downtime

Use ƽÌØÎå²»ÖÐ's research networks

Researchers at ƽÌØÎå²»ÖÐ have access to secure networks with guaranteed high bandwidths.

Digital research services hub

Consultation and training for researchers seeking technical services and support. Visit the Digital research services website.

IT Support for research administration

ƽÌØÎå²»ÖÐ provides IT support to administrative units that assist academics with their applications for research funds or research ethics approval. .

Acquiring software solutions

Buying new software? All storage and collaborations must be ƽÌØÎå²»ÖÐ-approved and comply with the ƽÌØÎå²»ÖÐ Cloud Directive - for all IT policies, see IT Policies, Regulations, Directives & Standards.

Other considerations when acquiring software:

  • Software Piracy : Unauthorized software use can have serious consequences. Ensure that your software use compliesÌýwith licensingÌýagreements.
  • The Cloud services website provides information including:
    • Cloud solution approval process
    • Types of data and what can be stored in the cloud
    • List of approved solutions at ƽÌØÎå²»ÖÐ

Traveling for research

Use the following resources to keep your devices, research data and personal information safe while travelling.

Connecting remotely

  • : The ƽÌØÎå²»ÖÐ VPN allows for secure communications over the Internet. You will need VPN to access ƽÌØÎå²»ÖÐ restricted sites and resources.
  • : Access the ƽÌØÎå²»ÖÐ network without having to plug in to a network jack.
    • : An authentication service that allows users to securely access the wireless networks of other educational institutions with the credentials they use at their home institution.
    • Use ƽÌØÎå²»ÖÐ-provisioned services designed to provide consistent secure access globally, such as , , etc.

Encrypt your files and computer

Encryption is a means of protecting the data stored on your computer. Data encryption is strongly recommended for anyone storing confidential data on their laptops. In case your device is stolen or left unattended, no one will be able to access your encrypted files without entering the password (also known as the encryption key).

  • (for ƽÌØÎå²»ÖÐ-managed computers)

Staying safe while working remotely

  • Working remotely: setup information, tools and resources
  • : stay safe online while you're on the move.
Ìý

Ìý

Ìý

Back to top