IT security

York Computer Emergency Response Team (CERT)

If your machine has been attacked or other activity of concern is taking place, contact CERT.

Securing your device

Choose a strong password & keep it safe

IT Services staff will never ask for your password by email, phone or in person.

Passwords »

Keep your device up to date

Update the software on your device to protect it from malware or a security breach.

Updating your device »

Remote security features

Lock or locate your device if it's lost or stolen.

Remote security »

Social media safety

Advice on using social media safely and responsibly.

Social media safety »

Screen lock

Stop others being able to access your device.

Set a screen lock »

Phone security

Treat your phone as carefully as your bank cards.

Safer Smartphones »

Safe use of University information on all devices

Safe use policy »


A number of information management courses are available to staff and postgraduate students.

Sign up »

Virus & malware protection

Protecting your device, & what to do if it gets a virus.

Virus & malware help »

Network settings & firewalls

Prevent automatic connections to unknown/open wireless networks.

Network settings »

Dispose of your device properly

Do you need to wipe your data, and how to do it.

Secure PC disposal »

Protect confidential data

Encrypt your data to keep it secure when stored or sent.

Encryption »

Email icon


File icon 

Files: security and policy

Internet icon

Monitoring internet usage

The University’s internet connection is provided by the UK’s research network JANET. It is a condition of our connection that we are able to trace misuse of the network to an individual if requested.

Share icon

Social networks

Lock icon

7 golden rules of information security

Our seven golden rules for protecting information, and protecting yourself:

Icon showing a suitcase

Using IT when you're travelling