• Skip to main content
  • assistive.skiplink.to.breadcrumbs
  • assistive.skiplink.to.header.menu
  • assistive.skiplink.to.action.menu
  • assistive.skiplink.to.quick.search
  • Metropolia.fi
  • Curricula
  • Wiki
  • Moodle
Metropolia
Menu
    • Attachments (1)
    • Page History
    • Page Information
    • Resolved comments
    • View in Hierarchy
    • View Source
    • Export to PDF
    • Export to Word
  • Browse
    • Pages
    • Blog
    • Labels
    • Space Operations
  • Login
    • Metropolia Login
    • Haka Login
    • Visitor Login

IT Services

  1. Dashboard
  2. IT Services
  3. Front page
Print
Main navigation

Information Security

Metropolia's activities are guided by existing legislation of public authorities, which instruct on the proper accessibility, availability and integrity of documents and information systems and the data they contain. These policies are continuously developed, monitored and, where necessary, improved. These developments are carried out in cooperation with all Metropolia departments.


Basic level information security training for Metropolia's personnel

How can I find the basic level information security training course of the personnel? 

Dear the staff of the Metropolia university, remember to complete the basic level information security training. By click the above heading you can read more about completing the course. 

Information security in short

Information security is one of the means of achieving data protection. Information security refers to the appropriate protection of various data, systems, services and data transmission using administrative and technical measures. Administrative measures consist of a company’s practices, such as its password policy. Technical measures are protection mechanisms functioning in the background, including firewalls and identity management.

Data can be secured through a variety of technical measures, but as a user you are the most responsible for the security of your data.

It's highly recommended to complete the information security training in Moodle.

Adopt these best practices

  1. Create a Strong Password and Use Passphrases
    Use a password that includes lowercase and uppercase letters, numbers, and special characters. Never share your password with anyone—if someone asks for it, they are likely a cybercriminal. Metropolia’s IT Serices will never request your password. A passphrase (e.g., a memorable sentence) can help you remember your password more easily. The recommended password length is 8–15 characters.
     
  2. Use Unique Passwords for Different Services
    Do not use the same password for Metropolia's information services as you do for other digital services, such as social media, online stores, or personal email. Use password manager tools to securely manage and store your passwords.
     
  3. Multi-Factor Authentication Adds an Extra Layer of Security
    Multi-Factor Authentication (MFA) requires a second method of verification in addition to your username and password. Many digital service providers, such as social media platforms, online stores, and email services offer MFA to enhance your account security.
     
  4. Report All Problems and Incidents to the Helpdesk
    If you forget your password or accidentally click on a suspicious link, change your password immediately.  Report any irregularities to Metropolia’s Helpdesk.
     
  5. Be Aware of Social Engineering
    Social engineering is a form of criminal activity where the attacker manipulates the victim into revealing sensitive information. The attacker may exploit the victim’s goodwill or lack of awareness. Always be cautious if someone asks you for information or actions that seem unusual.
     
  6. Keep Your Devices and Applications Up to Date
    Cybercriminals exploit outdated software and services that contain security vulnerabilities. Updates fix these issues and improve protection. Make sure your operating system, applications, and browser are always up to date to maintain maximum protection against cyberattacks.

Table of contents

  • General instructions
  • Information Security and Artificial Intelligence (AI)
  • Instructions for Information Security Threats
  • Processing of information and documents
  • Security and Privacy Guidelines for Metropolia's Remote Interviews
  • Software and system procurement
  • The Policies,Terms and Conditions of Information Security
  • Training materials and Metropolia's information security courses

Important information security guidelines and rules:

  • All software and system procurements go through risk management process
  • Data security or data protectin breach
  • How to recognise phishing email?
  • Regulations for Handling Email
  • IT instructions for traveling abroad


Useful Information management tools

Sensitive data server (Metroarch)

  • Metropolia has its own server, which is intended especially for storing and processing sensitive data from RDI-projects. Access rights can be granted to the material on the server for project employees both inside and outside of Metropolia.

Funet FileSender, secure way to share large files

  • Funet FileSender is a web based application that allows authenticated users to securely and easily send arbitrarily large files to other users. FileSender is developed to the requirements of the higher education and research community. The service is not intended for permanent storage of files, as the files will be deleted after certain time.

Secure e-mail

  • Secure e-mail is a tool that allows sensitive or confidential information to be sent securely to e-mail addresses.

Adobe Creative Cloud

  • Adobe Creative Cloud is a set of applications and services that gives access to a collection of software used for graphic design.

E-lomake

  • With E-form software, you make inquiries involving the processing of personal data, manage registrations and organize electronic recruitment flexibly, securely and easily.


Problems with computing or IT?

Submit a request of service at
https://hd.metropolia.fi

Phone service +358 9 7424 6777
Week days 8 - 16

Service points and opening hours

Note. Some instructions are only visible to logged in users. You can log in from the Login button in the upper right corner of the screen by using Metropolia, Haka or Visitor login.

Tietoturva ohjeistukset ja säännöt

  • Created by Petri Silmälä, last modified by Roope Rannikko on 5.6.2025
  • information
  • security
  • policy
  • updated2025
Overview
Content Tools
Apps
Pages
Blog
Labels
Space Operations
  • Powered by Atlassian Confluence 8.5.22
  • Printed by Atlassian Confluence 8.5.22
  • Report a bug
  • Atlassian News
Atlassian