Metadata
Title
Digital Technology Department
Category
undergraduate
UUID
7b70f5474b3d4b50906934b7b95c866d
Source URL
https://www.sharjah.ac.ae/en/Services/Departments/ITC/Security-and-Governance
Parent URL
https://www.sharjah.ac.ae/en/Services/Departments/ITC
Crawl Time
2026-03-24T06:04:27+00:00
Rendered Raw Markdown
# Digital Technology Department

**Source**: https://www.sharjah.ac.ae/en/Services/Departments/ITC/Security-and-Governance
**Parent**: https://www.sharjah.ac.ae/en/Services/Departments/ITC

Accessibility[Sign Language](#)[+971 6 5585000](tel: +97165585000)

Feedback

How would you rate your experience with our website?

Submit

## Security and Governance

IT security services ensure University’s precious Data is protected
with Confidentiality, ensure its integrity and Availability.

## Security Monitoring

24X7 Security Incidents Event Monitoring recently established. All
Critical services are now security monitored for any intrusion, Data
breech and cyber attacks.

## Online Security Trainings

Periodically Security trainings are offered to staff Example –
Email security, Data protection, Ransomware etc. Phishing simulations
are conducted to test awareness levels.

## Services Provided

### 01

Managed Detection and Response of security incidents through SIEM
24X7

### 02

Threat intelligence sharing

### 03

Vulnerability assessment for Critical services and advising Patch
updates

### 04

Security Awareness online trainings

### 05

End point security review

### 06

Network security review

### 07

Email Security review

### 08

Policy Governance

### 09

Penetration tests

## Dos and Don'ts

1. If you suspect a Cyber-attack, Data breech or any other IT security
   incidents report to IT service desk.
2. In case you feel your University IT account is compromised, Reset your
   password.
3. Ensure password complexity
4. Never Share your password
5. Store your data only in appropriate UoS approved Storages UosDrive or
   Departmental share drives
6. Don’t store data in Public Cloud storages like Google Drive or
   Dropbox etc.
7. University will never ask to share information through Non-IT channels
8. Use always University Email services as the primary mode of email
   communication
9. Ensure University Data is not shared outside publicly
10. Avoid public Display of your identity

---

## Frequently asked Questions

### How do I recognize a Phishing mail?

- Don’t immediately interact with mail, do not click on any links
  or attachments, it may infect your computer
- Use the REPORT Phish Button feature
- University’s IT security systems will automatically analyze and
  protect your email
- Always verify the sender's email address and ensure it is with
  ....@Sharjah.ac.ae
- Ensure the email id is spelled correctly
- Fraudsters may pretend and disguise email address with minor errors

### What precautions to be taken while working from Home ?

- If you are connected to University VPN with a non-University device
  such as a personal laptop or mobile, ensure it is patch updated and
  has an antivirus with the latest updates
- Try to carve out a personal space for work, with the computer screen
  not facing guests or outsiders
- Ensure you are connected directly to University VPN, not through
  private VPNs. Try to use State ISPs like Etisalat or Du only
- While doing online transactions of a confidential nature, ensure
  caution and that screens are not left unlocked if you are stepping
  away
- If you suspect a data breach, security incident, or your account is
  compromised, reach out to the IT service desk

### Need to report a problem?

Contact the IT Service Desk:
[servicedesk@sharjah.ac.ae](mailto:servicedesk@sharjah.ac.ae) 
or call 06-5050 000