Mie University Center for Information Technologies and Networks

  1. Home
  2. >
  3. Information Security Measures

Information Security Measures

Could it be infected? If you think so

If you think that your computer may be infected with a virus, please do the following immediately.


  1. Disconnect from the network immediately
    Infected viruses try to take the information inside your PC to the outside, or try to spread the infection horizontally. By first disconnecting from the network, you can prevent information leaks and the spread of infection.
    If using a wired connection, unplug the cable from the PC. If you are using wireless LAN, turn off the wireless function.
  2. Contact administrator
    If you think it's okay and leave it alone, it could turn into a big problem. If it is a shared PC installed on campus, please contact the administrator as soon as possible.
  3. Check for infection with antivirus software
    Inspect your entire computer and if a virus is found, remove it by following the instructions in your antivirus software.
  4. Change your unified account or email account password
    If you suspect your password has been compromised, please change your password immediately.
    ・You can change your unified account password from Unified Account Management System.
    ・Please log in to your Google account and change the faculty and staff email address (Mie University Sansui email) from the account management screen.
  5. Delete suspicious apps and files
    Please promptly delete any apps you do not remember installing or unknown files you do not remember downloading.

Basic security measures

Keep your software up to date

Always update your OS and software to keep them up to date.

Introduction of antivirus software

Install antivirus software and keep virus definition files up to date.
Our center provides antivirus software (ESET Endpoint Security) for computers on campus.

Password management

Do not use a password that can be guessed from personal information (name, birthday, etc.).
Make sure to include uppercase letters, lowercase letters, numbers, and symbols so that it is difficult for others to understand.

Beware of suspicious emails

Never open URLs or attachments contained in suspicious or unknown emails.
Even if the email emphasizes that it is urgent, such as [Urgent] or [Important], be calm in your judgment. Even if the sender is known, the email may be cleverly disguised to look like a genuine email.
Be careful of URLs and attachments with the following characteristics.

  • URL
    If the URL in the email is a short URL (shortened URL) or a URL you have never seen before, avoid clicking on it.
    Some fraudulent URLs may use URLs that resemble well-known sites. If the notification is from a site you are affiliated with, instead of clicking on the URL in the email, go to the correct URL on the website and check the content.
  • attached file
    If the file name extension is .exe or the file icon is different from what you normally see, do not open it.
    If your computer is set to "not display file extensions," set it to display file extensions so you can check the file extensions.

two-factor authentication

Our university has introduced two-factor authentication to prevent unauthorized access.
All faculty, staff, and students of our university are required to set up two-factor authentication for applicable services.

For more information on two-factor authentication, please see this page.

Information Security Policies and Guidelines