Information Security Resources
Software Updates
- Keeping your computer, including the operating system, and any third party software installed is extremely important. This process is known as patching or installing software updates.
- Software is constantly evolving to make it better and more resilient to the vulnerabilities and exploits from attacks.
- Failing to regularly update software can leave computers vulnerable which may lead to a compromise in personal information, or your computer could be used to launch an attack on other University systems.
- In addition to security fixes, software updates may also provide fixes to performance issues or provide new features and functionality.
- You should endeavor to keep all software current to mitigate security risks.
- Software updates may happen differently depending on your platform type.
- If you use a University-owned Windows Entra managed computer, operating system patches will be installed automatically.
- You may be required to restart your computer after patches (updates) are applied.
- Additionally, M365, Adobe Flash & Reader, Firefox, Java, Sophos, and Entra updates are applied automatically.
- Your system will be checked for certain software packages and versions.
- If any of the automatic updates have failed or have not been applied, you will receive a notification of the software packages, which have become outdated. The notification will instruct you to contact the IS Service Desk to arrange to have the software updated.
- Computers which are not University-owned Entra managed or are personally owned should be updated regularly.
- To configure automatic updating for
platform , please reference info in the following dropdowns that pertains to your operating system.
To update the applications and operating system on a Mac computer, see How to get software updates for your Mac from Apple.
It is recommended to enable
- Automatically check for updates.
- Download newly available updates in the background.
- Install app updates.
- Install OS X updates.
- Install system data files and security updates.
Windows Update is the best way to keep Windows updated with the latest security fixes, feature improvements, and other patches.
- To ensure you are receiving updates from Windows Update, it is recommended, you turn automatic updates on within your operating system.
-
If you have Windows 10, you will receive Microsoft patches automatically.
Note: Support for Windows 8 ended January 12, 2016, and support for Windows 8.1 ended January 10, 2023.
- Click "Settings", then "Change PC settings", and then click on "Update and recovery."
- Select "Choose how updates get installed."
- Under "Important updates", choose "Install Updates Automatically" (recommended).
- Under "Recommended updates", select the "Give me recommended updates the same way I receive important updates"
check box , and then click "Apply".
- Windows Updates typically only cover Microsoft products.
- You should also consider updating third party software, which includes any applications installed on top of the operating system.
- Adobe products, browsers such as Firefox or Chrome, and most other applications will require software updates. Often, the software can be configured to automatically update or prompt for updates.
- It is recommended to enable automatic updates for any software on your computer that supports it.
- Alternatively, you can visit the software vendor’s website to see if a more current version is available.
- If you have many software installations on your computer, checking for updates for each may be
time consuming . - There is a tool to automate this process called Secunia Personal Software Inspector (PSI). Secunia PSI is a utility which helps keep your software up-to-date. It does so by scanning your PC, providing information about out-of-date programs on your computer, and streamlines the installation of software updates. PSI is limited to Windows
platforms, and is intended to be used with personal computers or computers which are not centrally managed. - The Secunia PSI can be downloaded from https://secunia.com/vulnerability_scanning/personal/download/
Securing Confidential Files
- For example, if you wish to securely share a document via an attachment on an email message, the file contents must be encrypted to prevent the file from being accessed if it is forwarded or saved to a public location.
- It is vital you do not transmit the encryption password via the same method as the encrypted data.
- You should use another method to provide the password to the recipient. For example, if you are sending an encrypted file via email, you can send the password in a paper-based letter, or tell it to the recipient on the phone.
- Do not lose your password (encryption key).
- If you do lose your password, the files encrypted will not be accessible any longer.
- Versions prior to M365 only used very weak encryption which can easily be bypassed and should not be used.
- Microsoft
provides guidance on protecting Office files. This guidance includes instructions on encryption under the sections "Encrypt with Password." - Microsoft Protect your Documents Info
Encrypted PDF files can be read with most PDF readers, including Adobe Reader. Below are various methods for creating a PDF protected by a password.
- Create your document or open an existing PDF document using Word.
- From the File menu select 'Save As'
- Browse to a location to save the document.
- Select PDF (*.pdf) as the document type and click the 'Options...' button.
- In the PDF options section check the Encrypt the document with a password option.
- You will be prompted to type in the password twice and then click OK.
Adobe
AdobeNuance
Nuance Power PDF is the supported PDF tool at the University of Regina. Nuance provides guidance on how to create an "Open password " so that the document can not be viewed without the password:
MicrosoftPdftk
Pdftk Server is a free set ofNote: Replace file names and password as appropriate.
File Encryption
File Encryption means providing security for files that reside on media, in a stored state, such as a hard
Using Encrypted Zip Files
Zip files- When adding encryption to a zip file, files cannot be extracted without the password.
- On most managed computers, zip files can be created and read with the software 7-Zip.
- The program can be should already be installed on managed systems.
To create an encrypted zip file with 7-Zip:
- Start 7-Zip, and in the main screen, select the file that you wish to encrypt
- Click the Add button. This will open the Add to Archive window
- Set Archive format to
zip - Set Encryption method to AES-256
- Enter a strong password (See, choosing a strong password)
- Click OK
To create an encrypted zip file with iZip:
- Start iZip and click New
- Click Specify name
- In the Save As
field , enter the name you want to give the encrypted zip file, select the location you want to save it in the Where field, then click Create - When asked about password protection, tick Enable password protection and enter a strong password (See choosing a strong password)
- When asked about using encryption, choose AES 256 bit
- iZip will then ask you which files and folders you want to add to the encrypted zip file. When you have finished adding your files/folders, click Next
iZip will display a summary of the options you've selected, click Next and your encrypted zip file will be created.
- You can use p7zip (a Linux command line version of 7-Zip on Windows) to create encrypted zip files. You can install p7zip with the following terminal command: sudo apt-get install p7zip-full
- Once p7zip is installed, encrypted zip files can be created with the following terminal command:
- 7za a -y -
tzip -p -mem=AES256 archivename.zip /path/to/filestoencrypt - You will be prompted to enter a password for your encrypted zip file, which will then be saved to your current location in the terminal.
- 7za a -y -
- You can see a list of all available commands and switches in p7zip with the following terminal command: 7za -
h
FAQs
File Encryption means providing security for files that reside on media, in a stored state, such as a hard
- Encrypted files are usually stored locally and are encrypted and temporarily decrypted while being used and
than encrypted again after the user is finished using them. - File encryption should be used when
full system or full disk encryption is not used.
Data Confidentiality
- Encrypting stored files prevents unauthorized users from reading, copying, or deleting encrypted files.
- File encryption can help protect files and information that are stored at-rest on your system.
- Identity thieves can use information obtained from unencrypted files to commit fraud or steal information from your system, so it is important to protect your data.
- It ensures that if your computer or device is stolen, data stored in an encrypted format will be unavailable to unauthorized users.
VeraCrypt is encryption software which makes digital files unreadable except to people who have the passwords to open them.
- Faculty and Staff using devices that contain sensitive information, personally identifiable information, financial or research information, etc., should install VeraCrypt to protect their files while stored.
VeraCrypt uses the terms VeraCrypt file, VeraCrypt container, and VeraCrypt volume to describe the file used to store encrypted data. However, VeraCrypt container is used for the purpose of this article.
VeraCrypt Containers are a virtual disk encryption mechanism, wherein the process of encrypting a file called a container, which can hold many files and folders, and permitting access to the data within the container only after proper authentication is provided. Once authenticated, the virtual disk is mounted and accessible.
A VeraCrypt Container
- Can be moved, copied, duplicated, backed up, or deleted just like any file or folder. However, a VeraCrypt or its copies can not be opened without the password.
- Can only be opened with VeraCrypt and the password you set.
- When opened, can have files copied or saved into it, files modified in it, and files copied or deleted from it.
- Looks like another hard drive on your computer when opened. The files in it become encrypted when the virtual drive (i.e., container) is dismounted, or you quit the VeraCrypt program.
- Is available for Windows, Mac, and Linux. This allows users to encrypt on one system, and open on another system type, provided the password is known.
- Can encrypt files stored on portable media, such as a USB drive, even if the media its self is unencrypted.
- Can be used as a portable application, so that software installation rights are not required to access encrypted volumes.
Very important: Do not delete the VeraCrypt container or lose your password. If you do the files you have placed in the container can never be opened again.
- Additionally, note that tools other than VeraCrypt are recommended for full disk or full system encryption.
- VeraCrypt is only currently recommended for file/container encryption.
VeraCrypt is open-source and free of cost.
Note: however, VeraCrypt is not officially supported as per Policy OPS-080-015 Supported Hardware, Software, and Mobile Devices.
- Tools such as VeraCrypt can encrypt a single file or a file container.
- For the most up to date version for your computer see https://www.veracrypt.fr/en/Downloads.html
- For instructions on how to create a VeraCrypt container, as recommended, see: https://www.veracrypt.fr/en/Beginner%27s%20Tutorial.html
- Full documentation for VeraCrypt: https://www.veracrypt.fr/en/Documentation.html
Securing Adobe PDFs with Passwords
Nuance Power PDF
This is the supported PDF tool at the U of R. It provides information on how to create an "Open password" so that the document can not be viewed without the password.
File Encryption with VeraCrypt
Tools such as VeraCrypt can encrypt a single file or a file container.