Metropolia's activities are guided by existing legislation of public authorities, which instruct on the proper accessibility, availability and integrity of documents and information systems and the data they contain. These policies are continuously developed, monitored and, where necessary, improved. These developments are carried out in cooperation with all Metropolia departments.
Info | ||
---|---|---|
| ||
How can I find the basic level information security training course of the personnel?Dear the staff of the Metropolia university, remember to complete the basic level information security training. By click the above heading you can read more about completing the course. |
Information security in short
Information security is one of the means of achieving data protection. Information security refers to the appropriate protection of various data, systems, services and data transmission using administrative and technical measures. Administrative measures consist of a company’s practices, such as its password policy. Technical measures are protection mechanisms functioning in the background, including firewalls and identity management.
Data can be secured through a variety of technical measures, but as a user you are the most responsible for the security of your data.
It's highly recommended to complete the information security training in Moodle.
General guidelines
- Choose a strong password with both upper and lower case letters, numbers and special characters. If someone asks for your password, they are invariably on the wrong side of the tracks. IT services will never ask for your password.
- Always use different passwords for Metropolia services than for other services.
- If you forget your password or accidentally click on a scam message, change your password immediately with strong authentication at salasana.metropolia.fi.
- Do not open suspicious emails. If the suspicious message appears to be from someone you know, contact them by some other means, such as calling them. That way you can verify the authenticity of the message.
- Phishing messages are not limited to email – you may come across them in social media, text messages or instant messaging services (e.g. WhatsApp or Teams). In some cases, scammers call victims by phone. Never give out any of your personal details to unknown people.
Table of contents
Children Display |
---|
Div | ||
---|---|---|
| ||
Important information security guidelines and rules: |
Div | ||
---|---|---|
| ||
Useful Information management tools Sensitive data server (Metroarch)
Funet FileSender, secure way to share large files
|
Div | ||
---|---|---|
| ||
Problems with computing or IT?Submit a request of service at |
NoteOn this page you will find instructions about information security. By following them, you will help to protect your login credentials, your data and the systems you use. Some instructions are only visible to logged in users. You can log in from the Login button in the upper right corner of the screen by using Metropolia, Haka or Visitor login.
Children Display |
---|
Anchor