Other Reducing Options
It's not just data that deserves regular cleaning - it's also good to check from time to time who actually has access to our documents, what teams we're on and whether it's still relevant. And also who is in the teams or groups we manage.
Regular Reviews of Sharing
Collaboration is a daily routine for most of us, so it's normal to share files from OneDrive as well as within various teams and workgroups from Sharepoint. After a while, it can be easy to lose track of who has shared what and who has access to what. Fortunately, there are ways to audit sharing and access. You can find tutorials here:
Check Your Team Memberships
As the number of projects grows, so does the number of teams, groups, shared mailboxes and calendars that you own and continue to share or where you yourself are a member. So it's a good idea to check them once in a while to see who else is among the owners or members and how permissions are set for access or sharing. If there is no longer a need for you to be a member of a particular group, it is advisable to leave it. If you own a team, consider its currency and if you know you will no longer need the team, remove it.
- See a list of teams, groups and communities where you are an owner.
- See a list of teams, groups and communities where you are a member.
Share Documents Sensibly
If a document contains confidential information, always think about who you are sharing it with. It's also a good idea to follow secure sharing rules:
- Think carefully about who needs access to documents or files. It is better to share specifically to specific people rather than across the board.
- Sharing over anonymous lines is risky - you never know who else may get access to the document. All it takes is for a colleague to unknowingly email the link on, and the problem could be over! If you already use anonymous links, you can limit their validity for a limited time.
- Even if you choose the "People at MUNI" sharing type, this is a very wide range of users! If such a link starts spreading around the university, not only people from other departments can get access to the document, but also, for example, students or extramuralists with a so-called sponsored account.
- When sharing, consider what permissions others need to access the document or folder - they don't always need rights to edit it directly! Often it is enough that they can view the document or just suggest edits. Setting permissions appropriately will help you retain control of the document.
- Don't forget that the recipient of the sharing can share the documents too!
- Want a refresher on how to share documents? Check out this easy-to-follow guide.
Be Cautious when Communicating
If you report any problem, only University staff will communicate with you - either colleagues from the faculty IT centres or from the Department of Computer Science. You will never be contacted by Microsoft technical support. If someone calls you claiming to be Microsoft support, never give them any details and end the call.
Never reveal your login or other confidential information by email or phone. Technical support from CIT or the Service Desk will never ask for them. If you are not sure who is contacting you (e.g. in the case of an external company), feel free to verify the contact details (email address, phone number) on the company's official website.
For more information about cybersecurity, including the ability to report security incidents, please visit the MU Cybersecurity Team webpage.