Cyber Security
Research data is a valuable target for cyber threats. Whether you're working on campus, at home, or travelling internationally, these security practices form the foundation of protecting your work and Lakehead University's digital assets.
Data Location Considerations: Certain research data may need to remain in Canada – examples include defence contracts, Controlled Goods, provincial health datasets, or where ethics approval specifies Canadian storage. Before storing sensitive research data on cloud services, consider whether your funding agreement, REB approval, or data classification requires Canadian-hosted solutions. Contact the Research Security and Data Management Specialist for guidance.
Important: These security measures are especially critical when travelling internationally or working with sensitive research data. Implement them before your next research trip.
| 1. Strong Passwords & Password Managers | ||||||||||||||||||||||||
Weak or reused passwords are one of the most common ways attackers gain access to accounts. A single compromised password can expose your research data, email, and university systems — especially if you use the same password across multiple accounts. The Canadian Centre for Cyber Security recommends using passphrases or complex passwords of at least 12 characters. Use Passphrases: A passphrase is a sequence of mixed words (with or without spaces) that's easier to remember than random characters. Your passphrase should be at least 4 words and 15 characters. Example: Scan a room and describe what you see — "Closet lamp Bathroom Mug" becomes a strong, memorable passphrase. Password Best PracticesAll Lakehead systems (myEmail, myCourseLink, myInfo, WebAdmin, Library Proxy) require passwords that meet the Strong Password Standard. For maximum security:
Common Mistakes to Avoid
The Problem with Password Reuse:Attackers use "brute force" (trying common passwords) and "rainbow tables" (precompiled password lists) to crack short or simple passwords. Shorter passwords are much easier to hack. Using lengthy passphrases or complex passwords makes it significantly harder for threat actors to access your accounts. Check If Your Email Has Been BreachedData breaches happen constantly, and your email address may already be exposed. Use this free service to check: Have I Been Pwned? — Enter your email to see if it appears in known breaches. If your email shows up, change the password for that account immediately — and any other accounts where you used the same password. Get Future Alerts: Sign up for "Notify Me" to receive alerts about future breaches. Use a Password ManagerA password manager stores all your passwords securely and generates strong, unique passwords for each account. You only need to remember one master password. How it works: The manager stores credentials in an encrypted vault, auto-fills passwords on websites, generates random strong passwords, and syncs across all your devices. Trusted password managers:
| ||||||||||||||||||||||||
| 2. Two-Factor Authentication (2FA) | ||||||||||||||||||||||||
Two-factor authentication (2FA) adds a second layer of security beyond your password. Even if someone steals your password, they cannot access your account without the second factor. The Canadian Centre for Cyber Security strongly recommends 2FA for all accounts. Important — Three Areas to Secure:You need to enable 2FA in multiple places to be fully protected:
How SSO Works: When you log into any service or software using your Lakehead account credentials (Single Sign-On), Duo Security will prompt you for 2FA. This includes D2L, library databases, Microsoft 365, and many research tools. If you see a Lakehead login page, Duo is protecting that service. A. Duo Security (Lakehead SSO Systems)Lakehead uses Duo Security for two-factor authentication on all university Single Sign-On (SSO) systems. Any service or software that authenticates through your Lakehead account is protected by Duo. You have three options depending on what device you want to use:
Configure at least two authentication methods to avoid being locked out if you lose a device. Duo Initial Setup Steps
Option A: Windows Hello (Built-in Computer) Windows Hello uses security features built into your Windows computer — no phone or external device needed. If your computer has a fingerprint reader, facial recognition camera, or you've set up a Windows PIN, you can use it as your second factor. First, ensure Windows Hello is set up on your computer:
Then, add Windows Hello to Duo:
Why use Windows Hello? No phone required, no USB key to carry. Just use your fingerprint, face, or PIN when Duo prompts you. Fast and convenient if you primarily work from one computer. Important: Windows Hello only works on the specific computer where it's registered. Set up Duo Mobile as a backup for when you're on other devices or travelling. Option B: Duo Mobile App (Phone)Duo Mobile is a free app for your smartphone. When you log in, you'll receive a push notification to approve — or you can use a one-time code if you're offline. Download Duo Mobile: Android | iOS
Travel Tip: Duo Mobile works offline using one-time codes — ideal for international travel when you may not have cell service. Option C: Security Key / YubiKey (USB) A YubiKey is a small physical security key that plugs into your computer's USB port. When Duo prompts you, simply touch the key to authenticate.
Interested in a YubiKey? Contact the TSC Desktop team to see if they have any available. Need help? See the full Duo Setup Guide or contact TSC. B. Google 2-Step Verification (Lakehead Google Account)Your Lakehead Google account (@lakeheadu.ca) has its own 2-Step Verification that is separate from Duo.
Save Your Backup Codes: Google will offer backup codes during setup. Save these somewhere secure — they can unlock your account if you lose your phone. C. Other Software & ServicesBeyond Lakehead systems and Google, you should enable 2FA on every other account that supports it. This includes personal email, banking, social media, cloud storage, and any research tools or databases you use. Common Services with 2FA Options
Be Secure Everywhere: Take time to review all your accounts and enable 2FA wherever available. Check 2fa.directory to see if a specific service supports two-factor authentication. | ||||||||||||||||||||||||
| 3. Protecting Your Data | ||||||||||||||||||||||||
Data protection involves multiple layers: encrypting devices and files, transferring data securely, and using end-to-end encryption for sensitive communications. This section covers all aspects of keeping your research data safe. When Do You Need Extra Protection?
A. Protect Your DevicesFull-disk encryption ensures that if your laptop is lost or stolen, your data cannot be accessed without your password. This is essential for protecting research data. Windows: Enable BitLocker
Important: If you lose your recovery key, you cannot access your data if something goes wrong. Save it somewhere secure but accessible to you. Mac: Enable FileVault
Note: On newer Macs with Apple Silicon (M1/M2/M3), encryption is enabled by default. FileVault adds an extra layer by protecting the encryption key with your login password. Encrypt USB Drives & External StorageExternal drives should be encrypted, especially if they contain research data. Windows:
Mac:
Cross-Platform Note: BitLocker-encrypted drives may not be readable on Mac. If you need to use the drive on both, consider using VeraCrypt(free, works on both platforms). B. Protect Files in the CloudGoogle Drive encrypts files during transfer and storage, but Google (and potentially US authorities under the CLOUD Act) can access the contents. For sensitive research files, add your own encryption before uploading. When Should You Encrypt Files Before Uploading?
For everyday files (lecture notes, general correspondence, non-sensitive drafts), Google Drive's built-in encryption is sufficient. How to Encrypt Files Before UploadingChoose the method that matches your situation: Windows Only — 7-Zip (Best for Most Users) Download 7-Zip — Free, open-source, creates AES-256 encrypted archives.
Cross-Platform — Password-Protected ZIP (Mac to Windows or Vice Versa)Use this method when sharing between Mac and Windows users. Creates a .zip file anyone can open. On Mac (Terminal):
On Windows (7-Zip):
To Decrypt: Download the .zip file and double-click it. Enter the password when prompted. Works on both Windows and Mac without additional software. Office Documents Only (Word, Excel, PowerPoint)Microsoft Office has built-in AES-256 encryption: 1. Open your document in Word, Excel, or PowerPoint Sharing the Password Securely: Never send the password in the same email or message as the file link. Use a separate channel:
Remember: If you lose the password, the files cannot be recovered. Store passwords securely using a password manager. C. Protect Files in the CloudGood News: If you share files using email attachments or Google Drive, your transfers are already encrypted in transit. You don't need special tools for everyday file sharing. You need secure file transfer tools (SFTP) when uploading to research servers or computing clusters, transferring large datasets, or working with servers that require direct file access. Recommended tools: To connect:
Important: Always choose SFTP, not FTP. Regular FTP sends your password and files without encryption. D. Protect Files in the CloudEnd-to-End Encryption (E2EE) ensures that only you and your recipient can read messages or access content. Not even the service provider can see the content. For sensitive conversations with collaborators, especially when travelling or communicating outside institutional systems:
Zoom End-to-End Encryption for MeetingsLakehead's Zoom allows users to enable End-to-End Encryption (E2EE) for meetings that require extra security. When E2EE is enabled, the encryption keys are generated on participants' devices — not Zoom's servers — so even Zoom cannot access your meeting content. Step 1: Enable E2EE in Your Zoom Settings
Step 2: Schedule an E2EE Meeting 1. When scheduling a new meeting, look for the Encryption option near the bottom of the Meeting Details page Verifying E2EE is Active Look for the green shield icon with a checkmark in the top-left corner of your meeting window. Click it to view security codes that participants can verify match. E2EE Limitations When E2EE is enabled, these features are disabled:
Practical note: E2EE works well when everyone joins from laptops or mobile devices. It won't work if some participants are in a boardroom or classroom using Zoom Room equipment. Learn more: Zoom E2EE FAQ | Full setup guide & limitations Recommendation: Use E2EE only for sensitive meetings where extra protection is needed. For everyday meetings, "Enhanced encryption" is sufficient and preserves all Zoom features. Remember: Encryption protects files while stored and in transit. Also back up your data — encryption doesn't protect against hardware failure. | ||||||||||||||||||||||||
| 4. Backup Practices | ||||||||||||||||||||||||
A reliable backup strategy protects your research from hardware failure, theft, ransomware, or accidental deletion. Follow the 3-2-1 rule to ensure you never lose important work. The 3-2-1 Backup Rule
Storage Options at Lakehead
Total cloud storage available: 200GB — For larger datasets, you'll need to rely more on external drives. Example 3-2-1 Setup
This gives you: 3 copies, 2 storage types (cloud + physical), and 1 offsite (cloud). External Drive TipsWhat to buy:
Keep it secure:
Ransomware Protection: Ransomware encrypts all connected drives. Keeping your backup drive unplugged and stored separately means you can recover without paying. Making Backups a HabitSchedule reminders:
Key moments to back up:
Optional — Automate external drive backups:
Data Requiring Canadian Hosting
Use Nextcloud (through the Digital Research Alliance) instead of Google Drive for these files — Nextcloud servers are located in Canada. Not sure if your data requires Canadian hosting? Contact the Research Security and Data Management Specialist. | ||||||||||||||||||||||||
| 5. Secure Data Disposal | ||||||||||||||||||||||||
Simply deleting files or formatting a drive does not remove your data — it can be recovered with basic tools. Before disposing of, donating, or repurposing any storage device, you must securely erase all data. Windows — Eraser (TSC-recommended): 1. Download and install Eraser Mac — Disk Utility:
SSD Limitation: SSDs use "wear leveling" which distributes data across the drive — traditional overwrite methods can't guarantee complete erasure. For highly sensitive data on SSDs, physical destruction may be required. Contact TSC for secure disposal services. | ||||||||||||||||||||||||
| 6. Virtual Private Network (VPN) | ||||||||||||||||||||||||
A VPN creates a secure encrypted connection and lets you access campus resources from anywhere. Lakehead University uses FortiClient VPN. When to Use the VPN
FortiClient VPN SetupDownload FortiClient: Windows & Mac | Android | iOS Windows/Mac Configuration:
Mobile: Enter server address vpn.lakeheadu.ca and your Lakehead credentials. Windows Users: "Power saving mode" can disconnect your VPN. Disable this feature or use a wired connection for long sessions. Before You Travel: Test your VPN from a non-campus network. Some countries block VPNs — check travel advisories. Need help? See the full FortiClient VPN setup guide or contact TSC. | ||||||||||||||||||||||||
| 7. Device Physical Security | ||||||||||||||||||||||||
A stolen or unattended laptop can expose all your research data, saved passwords, and university access — even with strong passwords. Physical Security Best Practices
If Your Device Is Lost or Stolen
| ||||||||||||||||||||||||
| 8. Software Updates | ||||||||||||||||||||||||
Outdated software is one of the easiest ways for attackers to compromise your system. Security updates patch known vulnerabilities — delaying updates leaves you exposed. Enable Automatic UpdatesWindows: Settings → Windows Update → Turn on automatic updates Simple Rule: When your computer asks you to restart for updates, do it. Don't click "Remind me later" repeatedly. | ||||||||||||||||||||||||
| 9. Using Trusted Software | ||||||||||||||||||||||||
The software you install can be a security risk. Malicious software can steal your data or give attackers access to your system. Always use software from trusted sources. TSC-Approved Software Resources
Avoid Untrusted Software: Software from unknown websites, torrent sites, or unofficial sources may contain malware — even if it appears to work normally. Avoid pirated software. | ||||||||||||||||||||||||
| 10. Phishing & Email Security | ||||||||||||||||||||||||
Phishing is the #1 way attackers gain access to university systems. These messages use fear or urgency to trigger an impulsive reaction, often luring you to fraudulent websites that mimic legitimate ones. For detailed guidance, see Lakehead's Phishing Guide and Safe Computing Guidelines. Email Spoofing: Attackers can alter email headers to make messages appear to come from @lakeheadu.ca addresses. Always check the actual sender address (not just the display name) and report suspicious emails to the TSC Helpdesk. Red Flags: Phishing vs Legitimate Email
Common Phishing Scenarios for Researchers
How to Report Phishing at LakeheadIf you receive a phishing attempt, TSC wants to know about it. Follow these steps:
If you clicked a link or entered credentials, see Section 12: Incident Reporting immediately. Spotting Phishing WebsitesPhishing sites mimic legitimate websites. Look for these warning signs:
Tip: When in doubt, don't click links in emails. Instead, go directly to the website by typing the address in your browser. Why 2FA Matters: With Two-Factor Authentication enabled, even if you enter your password on a phishing site, attackers can't access your account without your second factor. For more information, visit the RCMP Canadian Anti-Fraud Centre. | ||||||||||||||||||||||||
| 11. USB & Unknown Devices | ||||||||||||||||||||||||
USB drives can carry malware that infects your computer the moment they're plugged in. Attackers deliberately leave infected drives in public places. The Risk: A USB drive can execute malicious commands instantly or run malware automatically when connected. This attack is so effective that it's used by nation-state actors targeting researchers. USB Safety Rules
| ||||||||||||||||||||||||
| 12. Incident Reporting | ||||||||||||||||||||||||
If something goes wrong — or you think something might have — report it. Quick reporting allows TSC to contain damage, protect others, and help you recover. The Rule: When in doubt, report. There's no penalty for reporting something that turns out to be nothing. There can be serious consequences for not reporting something real. What Should Be Reported?
How to ReportIT security incidents:
Research security concerns: | ||||||||||||||||||||||||
| 13. AI Tools & Data Leakage | ||||||||||||||||||||||||
AI tools like ChatGPT, Microsoft Copilot, Google Gemini, and Claude are increasingly used in research. However, these tools pose significant data security risks that researchers must understand. Critical Warning: When you input data into most AI tools, that data may be stored on foreign servers, used to train future AI models, and potentially accessible to the service provider. Assume anything you put into an AI tool could become public. What NOT to Put in AI Tools
The Data Sovereignty ProblemMost major AI tools process data on US servers. This creates issues with:
Before Using Any AI Tool — Ask These Questions1. Would I post this on a public website? If not, don't put it in an AI tool. Safe Uses for AI Tools: General concepts, brainstorming without specifics, checking grammar on non-sensitive text, learning programming syntax. Treat them like a public conversation. Questions about AI tool use? Contact the Research Security and Data Management Specialist for guidance. |
