Information and Communications Technology (ICT) security affects the entire University community—one compromised or infected computer can impact the productivity of everyone connected to the University network. IT security is a collective responsibility.
ICT takes many steps to maintain ICT security at the U of S; however, it is important for everyone to ensure the security of their personal computers (and computers they are responsible for).
For assistance with your computer security needs, please review the Tools & Resources section on the left side of this page. For additional help, please contact the ICT Help Desk.
ICT security is taken very seriously because it is critical that systems and network be available and reliable. To ensure that the University network is secure, ICT provides a number of services to help protect it:
If you encounter what you believe may be a security vulnerability or shortcoming of the ICT infrastructure at the University of Saskatchewan, please e-mail details to firstname.lastname@example.org or contact the ICT Help Desk.
To report incidents such as identity theft, harassment, physical theft, or criminal activity of any kind, please contact Campus Safety.
Although you are responsible for the security of your personal computer, there are tools and resources available to help you manage this responsibility.
ICT has developed "8 Steps toward ICT Security - An ICT Security Guide" to help you ensure your computer, and the information stored on it, is secure. You can also take an ICT Security course to learn about protecting your computer.
A number of ICT Security links are available online.
IT support is available from:
In addition, ICT offers Desktop Services. ICT has a group of qualified desktop support specialists who can be contracted to manage your desktop computers in colleges or departments.
For university employees who manage IT systems, ICT has subscribed to a set of Security Configuration Benchmarks from the Center for Internet Security. These benchmarks are intended to help with the deployment and maintenance of secure IT systems.