Configure your computers and devices securely

How to decrease risks if you need to use a BYOD or self managed device.

The easiest way for you to keep your computers and devices secure is to use one of the University's supported desktops. These will keep things up to date automatically, have security software configured and installed automatically, and any changes to configuration needed to mitigate new threats will be automatically applied. 

Your School or Unit may also have a management system for computers and devices in addition to or instead of the University's supported desktops; contact your local IT support for information. 

Advice on configuring BYOD or Self Managed devices 

You should ensure that you have configured any device you use for University work in a secure way. The responsibilities you accept by using a self-managed or BYOD device are detailed in our page on Using BYOD or self-managed devices.

Even if not used for University work personal devices are your responsibility and may be considered an easy target for threat actors, as they may perceive them to have fewer security measures in place. As well as putting you at risk a successful attack on your personal devices may give mechanisms to further attack your University account. We recommend that you follow the advice below for your personal devices even if you do not use them for University work. 

Some things that may be involved with this are: 

  • Keep your operating system up to date
    • Make sure that all updates from the OS manufacturer are installed as quickly after release as possible. Ideally, make sure that any updates are downloaded and installed automatically. If a manufacturer is no longer supporting the version of operating system you are using then do not continue to use it and look to upgrade the operating system and/or device to a supported version.  
  • Keep your software up to date
    • Software you use can also introduce security issues. Make sure that you know what you have installed and keep an eye on security announcements for that software, then install updates as soon as possible. Ideally, make sure that any updates are downloaded and installed automatically 
  • Don't install any software that you don't need, and uninstall software that is no longer needed
    • If you don't have the software installed then a security issue with that software will not be an issue 
  • Don't install any software from dubious sources 
    • Always make sure that you are downloading software from the manufacturer's website or a reputable source. 
  • Do not reduce the security of your firewall 
    • Most operating systems come with a firewall to protect your device with a safe configuration. Be careful when allowing applications to change the firewall settings. 
  • Remember physical security 
  • Remember data security
  • For further advice consult our "How to protect" pages.
  • You should always ensure that you follow all other relevant guidance such that you confirm with the Information Security Policy, Data Protection Policy and the Computing Acceptable Use Policy.