Information Security

► Standards & Policies
► Tips for Safe Computing
► Multi-factor Authentication

Categories (1)

Standards & Policies

Specific IT Standards and Policies

Articles (19)

Pinned Article Protect Your Identity

What is identity theft?
How identity thieves get your personal information?

Pinned Article Recognizing Phishing E-mails

Phishing e-mails are becoming more sophisticated and can be tricky to spot. Being able to recognize phishing e-mails can help prevent you from becoming a victim.

Pinned Article Tips for Safe Computing

All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.

Pinned Article When in doubt, don’t click

Clicking a link or document in a malicious email can significantly affect TRU, beyond the risk it poses to the confidentiality of personal information.

Awareness Sessions

Annual security and privacy awareness training is mandatory and must be completed by all new employees within the first month of employment.

Desktop Security Tools

Need desktop encryption, anti-virus, link scanner, spyware, password management, or firewall tools? Choose one or more of the items listed inside.

Digital Signatures

Digital signature tools utilizes either web based or software installed on your computer to enable you to sign a document electronically.

Microsoft Junk Mail Filter

Starting June 5th, 2023, IT Services will be fully implementing Microsoft 365 Spam Protection. For most people the biggest change you see is spam email will now be redirected to your Junk Email folder in Outlook. As it learns your email patterns we recommend you check your Junk Email folder occasionally to make sure it has not caught something you know is legitimate.

Pass Phrases

Pass phrases are easier to remember, easier to type, and more secure!


Pharming, pronounced farming, is a means of directing you to a fraudulent web site without your knowledge. The primary objective is to convince you to enter confidential data.


Phishing is a common online scam designed to trick you into disclosing your personal or financial information for the purpose of financial fraud or identity theft.

Recognizing Fake Websites

A fake or "spoofed" website can look just like a company's real site. Look for these signs to spot a fake site.

Shared Secrets

If you forget your password, some systems allow you to use shared secrets to gain access and reset your password.

Smart Phone Security

With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones.