Need some software? Before you purchase or download, check whether a University license already exists, or if there is a preferred alternative. This applies both for software on University devices and software for University use on a personal device.
Multi-factor authentication (MFA) is one of the most effective controls available to maintain the security of our data and systems.
'Spear phishing' is a very dangerous type of phishing in which criminals target individuals or companies using very realistic 'bait' or calls to action, using publicly available information. Spear phishing could draw on information from websites, social media, annual reports, media releases, or other easily available information.
Research computing infrastructure plays an important role, helping researchers break new ground. Find out more about the options and resources available ...
A range of software packages are available through ITDS. Contact us if what you are looking for is not listed, as there may be an alternative. Requests for software not offered by ITDS should be submitted via the Software Assessment form and once approved attached to a Special Request Requisition in ePro.
Need a new computer or workstation at home? Competitively priced computers and other IT equipment are available from preferred supplier CompNow, in a new ITDS initiative. Ergonomic workstations at discounted prices are also available from two office suppliers for home use.
Is your keyboard getting a bit dusty? Fingerprints on your screen? Sharing equipment and want to keep it clean? Top tips include turning everything off and unplugging first, avoiding moisture getting into openings, using soft cloths and avoiding abrasive cleaners.
We are all probably pretty aware of what to look out for to avoid getting trapped by ‘phishing’ emails, but ‘vishing’ (scam phonecalls) and ‘smishing’ (SMS scams) are also getting increasingly sophisticated. These days, almost any avenue of contact provides the opportunity for scams. Find out more.