Skip to main content Start main content

Strengthen defense against Cyber Threats for end point device

User workstations notebooks/ notebooks are computing devices for staff used to communicate and collaborate with peers, students and external business partners at office (and outside office for notebooks).  These fleet of machines are important productivity tools but also expand attack surface of campus if not included in University end point protection coverage.

Common security risks faced by end point devices:

  1. Unauthorized Access: If users use same office NetID and password on other social media applications or use weak password, there is a risk that the office NetID might be compromised enabling third party remote login to university applications falsifying as staff identity to issue phishing messages or run fraudulent transaction.

     

  2. Data Breach: Larger amounts of internal and sensitive information are processed on end point devices. Without proper security measures, once devices are breached or user NetID compromised, leading to valuable internal and sensitive information exposed.

     

  3. Malware and Virus: End point devices which are used to surf Internet are often targeted by malicious websites for implanting spyware, malware and viruses to gather sensitive information or to disrupt operations with financial motives. This could cause significant damage on University reputation.

     

  4. Loss or Theft: The University laptops could be lost and stolen in travel, without proper security measures, such as encryption and remote device management. Sensitive data stored on these devices may be at risk if the University laptops fall into the wrong hands.

Newsletter2023oct_PUDMS01

Over 6,000 workstations and notebooks have already joined PolyU domain and receive comprehensive security protection including regular patch updates, and desktop management support.

For workstations/ notebooks at departments which have not joined PolyU domain, we can strengthen their end point device protection by a simple enrolment process to Microsoft Cloud Intune.

Once Microsoft Defender for Endpoint (MDE) client software is successfully installed, the following security protections will be applied:

•       System hardening

o       Anti-Virus

o       Firewall

o       Attack Surface Reduction (ASR)

•       Regular system security patching

 

Also, in case the device is lost or stolen, it can be remotely wiped to ensure that University data is not accessed by unauthorized individuals.

More updates will be announced in coming issue. For assistance, please contact our IT HelpCentre (Tel: 2766 5900, WhatsApp/ WeChat: 6577 9669).

Newsletter2023oct_PUDMS02

 

Your browser is not the latest version. If you continue to browse our website, Some pages may not function properly.

You are recommended to upgrade to a newer version or switch to a different browser. A list of the web browsers that we support can be found here