Apply
  1. U of R Home
  2. IS
  3. Information Security
  4. Personal Security Resouces

Personal Security Resouces

Traveling Securely

Traveling with University of Regina assets, including data, and computer equipment requires special consideration and preparation.
  • The following guidelines are designed to help travelers secure their devices and work-related information while traveling.
What should I do to prepare prior traveling?
  • Forward your voicemail to email, or access your voicemail from the voicemail. This configuration saves you from having to dial into your voicemail account which can potentially reveal your voicemail passcode on insecure lines. For further info, see, Voicemail (UR Source, for employees)
  • Ensure you have strong passwords according to the password guidelines.
  • Ensure your Antivirus is current and actively running scans.
  • Backup your devices before traveling. Should your device be lost or stolen, your data will be stored safely elsewhere. Do not store the backup on portable media, such as a USB drive, and pack it with your luggage. Leave the backup at home, or at the office in an appropriately locked storage.
  • Travel light: Plan to bring a minimum number of devices. Reducing the number of devices that are being traveled with reduces the risk of compromise. Do not bring a device unless it is required.
  • Ensure all devices are configured to use a password, passphrase, or passcode. Ensure the passcode or password is automatically enabled when the device is unattended, locked, or sleeps. Never store the passcode with or on the device.
  • Remove all sensitive, or personal data from devices before traveling. For example, for a smartphone or tablet, prior to traveling it is recommended that you save your data, reset to factory defaults, and restore your backup when you return. For laptop computers, remove any documents containing personally identifiable data, confidential data, or institutional data from your computer.
  • Ensure the VPN client is installed. The VPN client should be used when accessing University services across the internet. Note: The VPN tunnel does not encrypt all traffic. Only traffic associated with University Network services is encrypted. See, technote for installation of the VPN client for multiple types of devices.
  • Familiarize yourself with the Information Security policy. These policies apply when you are traveling for University business.
  • Complete the online Information Security Awareness Training.
    • The Information Security Awareness Training is designed to raise awareness about information security, good information security practices, and related policy in order to help prevent unintentional compromises of sensitive information and computing systems. 
    • Specific topics related to traveling include handling of confidential data, physical security, wireless access points, recognizing and reporting a security incident, and working in public places.
How do I connect to some University of Regina software/applications if off-campus?
  • Ensure the VPN client is installed.
  • The VPN client should be used when accessing University services across the internet.
Note: The VPN tunnel does not encrypt all traffic. Only traffic associated with University Network services is encrypted. See, technote for installation of the VPN client for multiple types of devices.
What security risks should I be aware of while traveling?
  • Do not plug your phone or tablet into public USB chargers or kiosks. This can be a threat to the data on the phone as the cable may be connected to a hostile computer or device designed to infect your phone.
  • It is recommended to only use your own trusted chargers, cables, and power supplies.
  • Do not leave your devices unattended. Do not assume that a computer or mobile device left in a hotel room will be secure.
  • Be aware of your surroundings. Watch for those looking over your shoulder.
  • Do not share your device with anyone else.
  • Do not use public computers provided by libraries, hotels, etc. These machines should not be trusted as there is no way to confirm if malware such as keyloggers for password capturing has been installed.
  • Do not accept software updates or install software while when traveling. Some attackers push application updates containing malware to hotel network users, or app stores. It is better to update your applications before traveling and then avoid updates until you return home.
  • Complete only the minimum amount of business necessary while traveling.
  • Minimizing the amount of sensitive data created, stored, and transmitted is important in reducing information security risk.
Are Public (internet) Networks safe to use?
  • Use caution when connecting to the internet using public networks.
  • A public network is generally open and unsecured, which allows anyone access to it.
  • These networks are available in airports, hotels, restaurants, and coffee shops, usually in the form of a WiFi connection.
  • When you connect to a public network, your online activities and data transmissions can be monitored by others, and your data may be at risk.

When using a public network:

  • Avoid entering any personal or confidential information, such as passwords, credit cards, etc., until you have a more secure network connection.
  • Limit your use to casual browsing only, e.g., checking the news, looking up restaurant or movie information, or flight information, etc.
  • Use only encrypted web services, such as websites that connect to over HTTPS, or traffic can be intercepted.
  • Read, understand, and heed ALL browser warnings you see (i.e. pop-ups).
  • Consider alternative Wi-Fi connections such as using a cell phone to connect to the Internet (tethering).
  • Seek trusted networks that require an encryption key to utilize.
  • Use VPN when accessing University network services.
What should I do when I return from travels?
  • Change your uregina.ca password, and Banner password (if applicable): Instructions for changing password accounts.
  • If you checked your voicemail while traveling, change your voicemail passcode.
  • Ensure full malware scans are completed. If assistance is required to do so, contact the IS Service Desk.
  • If any signs of an loss of confidentiality, data integrity, or data loss occur as a result of travel, follow the directions to report an information security incident.
  • Save any documents you created while traveling to an external location and restore from your pre-departure backup.
  • Update operating system software and applications that were deferred during travel.

Physical Security

  • Using Anti-Virus software and ensuring that your computer and devices have the most current software updates are effective means of protecting your data from internet-borne threats.
  • However, this does not prevent someone from physically accessing your device or computer.
  • You can guard against malicious and unintentional damage to data by controlling access so only authorized people can read, edit or use it.
  • To reduce the risk to data loss from physical threats it is recommended that the following precautions be practiced. 
Lock your computer/laptop if unattended
If you are away from your computer, lock your it so that a password is required for log in. 
Ensure that computers/laptops automatically lock after a period of being idle

Configure your screen saver to lock after a short period of idle and require a password to unlock

Windows 10

  1. Right-click on your Windows 10 desktop, and select Personalize, then click on "Lock screen" in the left pane.
  2. Scroll down the Lock Screen settings and click on "Screen Saver Settings".
  3. Enter the maximum idle time before screen locks in minutes in the "Wait" box. Recommended to be as short as reasonable, but not longer than 60-minutes. 
  4. Click on the On resume, display logon screen option, and click "Apply".

Mac

Apple Support

  1. From the Apple menu, select System Preferences, then click on the "Desktop and Screen Saver".
  2. Click the "Screen Saver" tab, then enter the "Start after" period to be as short as reasonable, but not longer than 60-minutes.
  3. From the Apple menu, select System Preferences, then click "Security & Privacy", then the "General" tab.
  4. Check the Require password after sleep or screen saver begins option.
  5. Close the system preference window.
Other Phyical Security Tips
  • Do not assume physical privacy will ensure information security even in locked or non-public areas. 
  • Keep sensitive data on central files stores rather than on local desktops or laptops, which can be more easily stolen.   
  • If you are away from your computer for an extended time, simply log out of your operating system or power off your computer.
  • Examine your computer system. If your system has been altered without your knowledge, do not use it. Be aware of any new devices plugged into your computer or keyboard.
  • When disposing of your personal devices, ensure that data is properly wiped. This includes mobile devices, USB storage media, CDs, memory cards, portable hard drives, desktops, and laptops.
  • Keep computers in a locked cabinet or cable locked if in a publicly assessable area.
  • Hard copies containing sensitive information should be kept in locked storage, and make a habit of turning documents face down.
  • Minimize the amount of printing. Paper copies can lead to information breaches. Also, ensure sensitive documents are properly disposed of by shredding.
  • Exercise caution when using public terminals.
  • Do not use found physical media such as a USB stick that is not yours.
  • Minimize use of portable media such as CDs, memory sticks, portable hard drives as they are vulnerable to loss or damage.