Apply

Information Security Resources

Software Updates

  • Keeping your computer, including the operating system, and any third party software installed is extremely important. This process is known as patching or installing software updates.
  • Software is constantly evolving to make it better and more resilient to the vulnerabilities and exploits from attacks.
  • Failing to regularly update software can leave computers vulnerable which may lead to a compromise in personal information, or your computer could be used to launch an attack on other University systems.
  • In addition to security fixes, software updates may also provide fixes to performance issues or provide new features and functionality.
  • You should endeavor to keep all software current to mitigate security risks.
  • Software updates may happen differently depending on your platform type.
University-owned Managed Computers (Evergreen Program)
  • If you use a University-owned Windows Entra managed computer, operating system patches will be installed automatically.
  • You may be required to restart your computer after patches (updates) are applied.
  • Additionally, M365, Adobe Flash & Reader, Firefox, Java, Sophos, and Entra updates are applied automatically.
  • Your system will be checked for certain software packages and versions.
  • If any of the automatic updates have failed or have not been applied, you will receive a notification of the software packages, which have become outdated. The notification will instruct you to contact the IS Service Desk to arrange to have the software updated.
Non-managed devices and Personal Computers
  • Computers which are not University-owned Entra managed or are personally owned should be updated regularly.
  • To configure automatic updating for platform, please reference info in the following dropdowns that pertains to your operating system.
Mac Operating System Update Info

To update the applications and operating system on a Mac computer, see How to get software updates for your Mac from Apple. 

It is recommended to enable automate updates. Under "Apple Menu", click "System Preferences". Go to the App Store Panel and check all options, including:

  • Automatically check for updates.
  • Download newly available updates in the background.
  • Install app updates.
  • Install OS X updates.
  • Install system data files and security updates.
Windows Operating System Update Info

Windows Update is the best way to keep Windows updated with the latest security fixes, feature improvements, and other patches.

  • To ensure you are receiving updates from Windows Update, it is recommended, you turn automatic updates on within your operating system.
  • If you have Windows 10, you will receive Microsoft patches automatically. 

Windows 8 and Windows RT Update info

Note: Support for Windows 8 ended January 12, 2016, and support for Windows 8.1 ended January 10, 2023.

  1. Click "Settings", then "Change PC settings", and then click on "Update and recovery."
  2. Select "Choose how updates get installed."
  3. Under "Important updates", choose "Install Updates Automatically" (recommended).
  4. Under "Recommended updates", select the "Give me recommended updates the same way I receive important updates" check box, and then click "Apply".
Third Party Software Update Info
  • Windows Updates typically only cover Microsoft products.
  • You should also consider updating third party software, which includes any applications installed on top of the operating system.
  • Adobe products, browsers such as Firefox or Chrome, and most other applications will require software updates. Often, the software can be configured to automatically update or prompt for updates.
  • It is recommended to enable automatic updates for any software on your computer that supports it.
  • Alternatively, you can visit the software vendor’s website to see if a more current version is available.
  • If you have many software installations on your computer, checking for updates for each may be time consuming.
  • There is a tool to automate this process called Secunia Personal Software Inspector (PSI). Secunia PSI is a utility which helps keep your software up-to-date. It does so by scanning your PC, providing information about out-of-date programs on your computer, and streamlines the installation of software updates. PSI is limited to Windows platforms, and is intended to be used with personal computers or computers which are not centrally managed.
  • The Secunia PSI can be downloaded from https://secunia.com/vulnerability_scanning/personal/download/

Securing Confidential Files

It is important to protect the contents of a file to ensure it remains confidential.
  • For example, if you wish to securely share a document via an attachment on an email message, the file contents must be encrypted to prevent the file from being accessed if it is forwarded or saved to a public location.
The following is a list of methods you can securely store and share documents which are sensitive or confidential, and this requires encryption.
Two important points to remember with File Encryption
  1. It is vital you do not transmit the encryption password via the same method as the encrypted data.
    • You should use another method to provide the password to the recipient. For example, if you are sending an encrypted file via email, you can send the password in a paper-based letter, or tell it to the recipient on the phone.
  2. Do not lose your password (encryption key).
    • If you do lose your password, the files encrypted will not be accessible any longer. 
Using Microsoft Office for File Encryption
The currently supported versions of Microsoft Office for Windows and MAC can encrypt a file using strong encryption.
  • Versions prior to M365 only used very weak encryption which can easily be bypassed and should not be used.
  • Microsoft provides guidance on protecting Office files. This guidance includes instructions on encryption under the sections "Encrypt with Password."
  • Microsoft Protect your Documents Info
Using PDFs for File Encryption

Encrypted PDF files can be read with most PDF readers, including Adobe Reader. Below are various methods for creating a PDF protected by a password.

  1. Create your document or open an existing PDF document using Word.
  2. From the File menu select 'Save As'
  3. Browse to a location to save the document.
  4. Select PDF (*.pdf) as the document type and click the 'Options...' button.
  5. In the PDF options section check the Encrypt the document with a password option.
  6. You will be prompted to type in the password twice and then click OK.

Adobe

Adobe provide their own guidance on encrypting a PDF by adding a password to the file:

Nuance

Nuance Power PDF is the supported PDF tool at the University of Regina.  Nuance provides guidance on how to create an "Open password " so that the document can not be viewed without the password:

Microsoft provide their own guidance on protecting Office files. This guidance includes instructions on encryption under the sections "Encrypt with Password".

Pdftk

Pdftk Server is a free set of command line tools for modifying PDF files.  Is available for Mac, Windows, and Linux.  Once installed, you can encrypt a PDF file with the following terminal command:
pdftk MyFile.pdf output MyFile_encrypted.pdf user_pw PasswordGoesHere
Note: Replace file names and password as appropriate.

File Encryption

File Encryption means providing security for files that reside on media, in a stored state, such as a hard drives, USB drive, SD Card, or any other type of digital storage medium.

Using Encrypted Zip Files

Zip files allow allow one or more files to be encrypted within a single file.
  • When adding encryption to a zip file, files cannot be extracted without the password.  
File Encryption for Windows
  • On most managed computers, zip files can be created and read with the software 7-Zip.
  • The program can be should already be installed on managed systems. 
On unmanaged or personally owned PCs, 7-Zip can be install for free:

To create an encrypted zip file with 7-Zip:

  1. Start 7-Zip, and in the main screen, select the file that you wish to encrypt
  2. Click the Add button. This will open the Add to Archive window
  3. Set Archive format to zip
  4. Set Encryption method to AES-256
  5. Enter a strong password (See, choosing a strong password)
  6. Click OK
You will now find a new file with a .zip extension in the same folder as the original file. The contents of this zip file can be accessed only with knowledge of the password.
File Encryption for Mac
One option for secure zip encryption on Mac OS X is to use iZip, which is a free download:

To create an encrypted zip file with iZip:

  1. Start iZip and click New
  2. Click Specify name
  3. In the Save As field, enter the name you want to give the encrypted zip file, select the location you want to save it in the Where field, then click Create
  4. When asked about password protection, tick Enable password protection and enter a strong password (See choosing a strong password)
  5. When asked about using encryption, choose AES 256 bit
  6. iZip will then ask you which files and folders you want to add to the encrypted zip file. When you have finished adding your files/folders, click Next
  7. iZip will display a summary of the options you've selected, click Next and your encrypted zip file will be created.
File Encryption for Linux
The following instructions are based on Ubuntu 14.04. Other Linux distros may be similar but not identical.
  • You can use p7zip (a Linux command line version of 7-Zip on Windows) to create encrypted zip files. You can install p7zip with the following terminal command: sudo apt-get install p7zip-full
  • Once p7zip is installed, encrypted zip files can be created with the following terminal command:
    • 7za a -y -tzip -p -mem=AES256 archivename.zip /path/to/filestoencrypt
    • You will be prompted to enter a password for your encrypted zip file, which will then be saved to your current location in the terminal.
  • You can see a list of all available commands and switches in p7zip with the following terminal command: 7za -h

FAQs

What is File Encryption?

File Encryption means providing security for files that reside on media, in a stored state, such as a hard drives, USB drive, SD Card, or any other type of digital storage medium.

  • Encrypted files are usually stored locally and are encrypted and temporarily decrypted while being used and than encrypted again after the user is finished using them.
  • File encryption should be used when full system or full disk encryption is not used.
Why should I encrypt my files?

Data Confidentiality

  • Encrypting stored files prevents unauthorized users from reading, copying, or deleting encrypted files.  
  • File encryption can help protect files and information that are stored at-rest on your system.
  • Identity thieves can use information obtained from unencrypted files to commit fraud or steal information from your system, so it is important to protect your data.
  • It ensures that if your computer or device is stolen, data stored in an encrypted format will be unavailable to unauthorized users.
What file encryption software does the University of Regina recommend?

VeraCrypt is encryption software which makes digital files unreadable except to people who have the passwords to open them.

  • Faculty and Staff using devices that contain sensitive information, personally identifiable information, financial or research information, etc., should install VeraCrypt to protect their files while stored.

VeraCrypt uses the terms VeraCrypt file, VeraCrypt container, and VeraCrypt volume to describe the file used to store encrypted data. However, VeraCrypt container is used for the purpose of this article.

VeraCrypt Containers are a virtual disk encryption mechanism, wherein the process of encrypting a file called a container, which can hold many files and folders, and permitting access to the data within the container only after proper authentication is provided. Once authenticated, the virtual disk is mounted and accessible.

A VeraCrypt Container

  • Can be moved, copied, duplicated, backed up, or deleted just like any file or folder. However, a VeraCrypt or its copies can not be opened without the password.
  • Can only be opened with VeraCrypt and the password you set.
  • When opened, can have files copied or saved into it, files modified in it, and files copied or deleted from it.
  • Looks like another hard drive on your computer when opened. The files in it become encrypted when the virtual drive (i.e., container) is dismounted, or you quit the VeraCrypt program.  
  • Is available for Windows, Mac, and Linux. This allows users to encrypt on one system, and open on another system type, provided the password is known.
  • Can encrypt files stored on portable media, such as a USB drive, even if the media its self is unencrypted.
  • Can be used as a portable application, so that software installation rights are not required to access encrypted volumes.

Very important: Do not delete the VeraCrypt container or lose your password. If you do the files you have placed in the container can never be opened again. 

  • Additionally, note that tools other than VeraCrypt are recommended for full disk or full system encryption.
  • VeraCrypt is only currently recommended for file/container encryption.
What is the cost for file encryption?

VeraCrypt is open-source and free of cost.

Note: however, VeraCrypt is not officially supported as per Policy OPS-080-015 Supported Hardware, Software, and Mobile Devices.

Where can I download the VeraCrypt software?

Securing Adobe PDFs with Passwords

Adobe provides information on encrypting a PDF by adding a password to the file.

Nuance Power PDF

 This is the supported PDF tool at the U of R.  It provides information on how to create an "Open password" so that the document can not be viewed without the password.

File Encryption with VeraCrypt

Tools such as VeraCrypt can encrypt a single file or a file container.

MFD Security Standard

Network Printer, Scanner, Fax and Multifunction Device (MFD) Security Standard

Secure Scanning + Printing

Secure printing and scanning includes managing both the digital documents and the paper versions of these documents.

Campus Printing

See, printing info on campus, which includes papercut and iprint instructions.