Information Technology Center
Information Technology Center

Information Technology Center

Security & Governance

IT security services ensure University’s precious Data is protected with Confidentiality, ensure its integrity and Availability.

Security Monitoring

24X7 Security Incidents Event Monitoring recently established. All Critical services are now security monitored for any intrusion, Data breech and cyber attacks.

Online Security Trainings

Periodically Security trainings are offered to staff Example – Email security, Data protection, Ransomware etc. Phishing simulations are conducted to test awareness levels.

Services Provided

01

Managed Detection and Response of security incidents through SIEM 24X7

02

Threat intelligence sharing

03

Vulnerability assessment for Critical services and advising Patch updates

04

Security Awareness online trainings

05

End point security review

06

Network security review

07

Email Security review

08

Policy Governance

09

Penetration tests

Dos & Don'ts

  1. If you suspect a Cyber-attack, Data breech or any other IT security incidents report to IT service desk.
  2. In case you feel your University IT account is compromised, Reset your password.
  3. Ensure password complexity
  4. Never Share your password
  5. Store your data only in appropriate UoS approved Storages UosDrive or Departmental share drives
  6. Don’t store data in Public Cloud storages like Google Drive or Dropbox etc.
  7. University will never ask to share information through Non-IT channels
  8. Use always University Email services as the primary mode of email communication
  9. Ensure University Data is not shared outside publicly
  10. Avoid public Display of your identity

Frequently asked Questions

How do I recognize a Phishing mail?

  • Don’t immediately interact with mail, do not click on any links or attachments, it may infect your computer
  • Use the REPORT Phish Button feature
  • University’s IT security systems will automatically analyze and protect your email
  • Always verify the sender's email address and ensure it is with ....@Sharjah.ac.ae
  • Ensure the email id is spelled correctly
  • Fraudsters may pretend and disguise email address with minor errors

What precautions to be taken while working from Home ?

  • If you are connected to University VPN with a non-University device such as a personal laptop or mobile, ensure it is patch updated and has an antivirus with the latest updates
  • Try to carve out a personal space for work, with the computer screen not facing guests or outsiders
  • Ensure you are connected directly to University VPN, not through private VPNs. Try to use State ISPs like Etisalat or Du only
  • While doing online transactions of a confidential nature, ensure caution and that screens are not left unlocked if you are stepping away
  • If you suspect a data breach, security incident, or your account is compromised, reach out to the IT service desk

Need to report a problem?

Contact the IT Service Desk: servicedesk@sharjah.ac.ae or call 06-5050 0000