Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Metropolia's activities are guided by existing legislation of public authorities, which instruct on the proper accessibility, availability and integrity of documents and information systems and the data they contain. These policies are continuously developed, monitored and, where necessary, improved. These developments are carried out in cooperation with all Metropolia departments.


Info
titleBasic level information security training for Metropolia's personnel

How can I find the basic level information security training course of the personnel? 

Dear the staff of the Metropolia university, remember to complete the basic level information security training. By click the above heading you can read more about completing the course. 

Information security in short

Information security is one of the means of achieving data protection. Information security refers to the appropriate protection of various data, systems, services and data transmission using administrative and technical measures. Administrative measures consist of a company’s practices, such as its password policy. Technical measures are protection mechanisms functioning in the background, including firewalls and identity management.

Data can be secured through a variety of technical measures, but as a user you are the most responsible for the security of your data.

It's highly recommended to complete the information security training in Moodle.

General guidelines

  • Choose a strong password with both upper and lower case letters, numbers and special characters. If someone asks for your password, they are invariably on the wrong side of the tracks. IT services will never ask for your password.
  • Always use different passwords for Metropolia services than for other services.
  • If you forget your password or accidentally click on a scam message, change your password immediately with strong authentication at salasana.metropolia.fi.
  • Do not open suspicious emails. If the suspicious message appears to be from someone you know, contact them by some other means, such as calling them. That way you can verify the authenticity of the message.
  • Phishing messages are not limited to email – you may come across them in social media, text messages or instant messaging services (e.g. WhatsApp or Teams). In some cases, scammers call victims by phone. Never give out any of your personal details to unknown people.

Table of contents

Children Display

Div
classbbox

Important information security guidelines and rules:

...