This page provides further details about information security collected from the Helpdesk site, Student’s digital skills and Flamma. You can find more help from this instructions site by using, for example, the search. If you cannot solve the problem with the instructions, don’t hesitate to contact the IT Helpdesk.
Email encryption methods
- Confidential email – Instructions for message protection
- Microsoft Office 365 Message Encryption in the Office 365 service
- GnuPG: Email and file encryption application – Software for encrypting and signing email traffic and files
- Encryption of confidential files – Compressing and encrypting data materials with the 7-zip program
- General information about encryption methods
Securemail
- Sec@GW plugin for Outlook – An Outlook plugin for encrypting messages
- Email S/MIME encryption – An encryption method for those who process larger amounts of confidential data (Windows)
- S/MIME encryption for Mac – Encryption instructions for Mac
- Ordering and using the S/MIME certificate with shared mailboxes – Instructions for ordering and using the S/MIME certificate with an Office 365 shared mailbox
File encryption
Funet FileSender – An online tool for transferring large files
Encrypted flash drive – General information on using an encrypted flash drive
Encryption of confidential files – Compressing and encrypting data materials with the 7-zip program
General information about encryption methods
Computer information security
Information security software – Installation instructions for information security software used on home computers
Computer virus scan – Instructions for running a virus scan with F-Secure’s software
Installing OpenVPN on a home computer (Windows) – Instructions for installing OpenVPN on Windows (on a home computer)
Installing and using Tunnelblick on a home computer (Mac) – VPN connection from a home computer
Installing the HYAD_ROOT_CA certificate on a Windows computer – A certificate used by system administrators
Information security of mobile devices
Deployment and safe use of mobile devices
VPN connection on an Android device – Instructions for installing and using VPN software
Office 365: Remote wiping of a mobile device
iPad and iPhone: Information security – Instructions for protecting a mobile device
Multifactor Authentication (MFA): Use and management of authentication methods
Multifactor Authentication
Multifactor Authentication (MFA) for Microsoft Office 365 services (e.g. Outlook, Teams, OneDrive) will gradually become mandatory across the University. It will enable the University to secure user accounts increasingly better, while also significantly boosting the University’s information security.
Give feedback
The instructions site of the University of Helsinki's IT Helpdesk helps you with IT-related issues related to your work. Let us know how we can improve our instructions. We greatly appreciate your feedback!
How would you improve these instructions?