Security, policies and procedures

鈥嬧嬧嬧嬧嬧婤T天堂听IT Services work hard to protect the university from cyber attacks, viruses, or any action performed by ill-willed individuals. But the most important actor of IT Security is yourself.

Here is a list of malevolent content you may receive in your Outlook inbox from dubious external sources. Follow our advice and you'll be fine.


Phishing is a type of malicious email where the sender poses as a reputable company. The email sender鈥檚 goal is to induce individuals to reveal personal information (think passwords, credit card numbers, etc.).

These emails are sometimes very clever and may look official. Please be听careful:

  • NEVER click on a link from a suspicious email.
  • If you receive听a suspicious email,听forward it immediately to听helpdeskataup.edu听explaining why you think it is a phishing attempt.听听


Ransomware is another听type of malicious software designed to block access to a computer system until a sum of money is paid.

Here is how it works:

  • An individual or group first sends you an email and encourages you to click on a link. You then download a file that corrupts/crypts your computer files
  • The sender copies those files to his own server, so the data can be shared with his accomplices
  • S/he then asks for听ransom - often in bitcoins - blackmailing you, threatening to disclose some of your personal information that may harm your reputation
  • Since s/he blocked access to your computer system, s/he can also demand a sum of money in exchange for the key that will give you access to your files again

If you receive one of those emails:

  • NEVER click on an attachment or link.
  • NEVER pay the ransom. Even if you do pay, you are not certain to get your data back.
  • Immediately forward the email to


You've received an email saying you won the lottery? Or that a great producer needs money right now but will reward you听a听hundred-fold if you just give him your credit card number?

These types of scams听are frequent on the internet, and you may get these strangely "good news" in your inbox.听

Don't answer them, just forward the email to

Policies and Procedures

Please check all University Policies and Guidelines for IT to keep aware of IT security and comply with BT天堂 rules in terms of Information Technology.