Skip to main content

Computer security

Information security at USQ is concerned with ensuring the availability, integrity and confidentiality of the University's information and information systems in a manner that is compliant with legislative, statutory and regulatory requirements, aligned with business requirements and commensurate with threat assessments.

Physical security of your computer is as important as keeping your password and data secure. Both USQ and personal devices should be 'locked' when you leave your desk for any length of time, e.g. for coffee breaks or lunch. 

Where possible, you should also lock your office as a defence against thieves. They have been known to steal laptops and computers as well as handbags, wallets and mobile phones etc. Most USQ buildings are accessible to the public and not just limited to USQ personnel, it is important that you keep your belongings safe and secure.

Windows 7

If your computer operates using Windows 7, you can lock your workstation by pressing the [Windows Key]-[L] keys simultaneously. To unlock your computer, press the [CTRL]-[ALT]-[DEL] keys simultaneously and enter your USQ password, then select OK.

When leaving at the end of the working day, please log off your computer by pressing the Start Menu (located bottom left) and selecting the Shut Down option.

MAC

If your computer is a MAC you can lock your workstation by pressing the Ctrl + Shift + Eject/Power. To unlock your computer, press any key and enter your USQ password, then select OK.

When leaving at the end of the working day, please log off your computer by pressing the Ctrl + Eject/Power then select Shut Down from the menu.

Mobile devices

The increasing popularity of mobile devices (ie smart phones, laptops, tablets, etc.) and their use to access corporate, personal and financial information is making them a prime target for hackers, malware and criminals. To minimise the risk and potential loss it is important to:

  • be familiar with and use the security, encryption and privacy feature of your devices
  • be familiar with the ICT Services Security Guidelines for Mobile Devices