Strategies for reading academic articles (Bitesize)

29 January 2018 - 29 January 2018, . : Do you need to speed up your academic reading? Do you want to find time to broaden your reading?

Calorie Intake Information by Leanplan

06 February 2018 - 06 February 2018, . Middlesbrough Tower Foyer (opp lifts): February is Healthy Heart Month

Holocaust Memorial Day Commemoration

24 January 2018 - 24 January 2018, . Mima Events Space: Holocaust Memorial Day is a time for everyone to remember the millions of people murdered or who ...

Research degree induction for new starters

05 February 2018 - 05 February 2018, . Phoenix P3.16: This is the compulsory induction session for new research degree students starting studies in the ...

Writing a research proposal

05 February 2018 - 05 February 2018, . : Do you have to write a research proposal and are not sure what needs to be covered in it? Want some tips on how ...

RefWorks: an easy way to manage your references

23 January 2018 - 23 January 2018, . : Is referencing and citing a chore?

Space Mission Lecture

31 January 2018 - 31 January 2018, . : Teesside University embarks on an exciting space mission

Successful CVs for international students

31 January 2018 - 31 January 2018, . : International students, do you need to create a CV for the UK job market?

Innovation Workshop

24 January 2018 - 24 January 2018, . Darlington Hippodrome: Do you want to generate profitable new business ideas?

Facts matter: Counteracting Fake News

31 January 2018 - 31 January 2018, . : What is it? How do you identify it? What can you do about it? This workshop will discuss:

Professorial Lecture Series: Bodies of Evidence

25 January 2018 - 25 January 2018, . : Inaugural Professorial Lecture

The All-American Dream Summer Job with USA Summer Camp

01 February 2018 - 01 February 2018, . : Working at an American Summer Camp is the best summer job you could ever do.

Writing a literature review

24 January 2018 - 24 January 2018, . : Do you need to write a literature review?

Teaching in Further Education

01 February 2018 - 01 February 2018, . : Are you thinking of a career teaching in sixth form colleges, further education colleges or adult education?

Apostrophes and how to use them (Bitesize)

25 January 2018 - 25 January 2018, . : Do you wonder where to put apostrophes in your writing? This 25-minute bitesize workshop will introduce you to the ...

Women Judges in Contemporary China: Gender, Judging and Living (Palgrave, 2017)

24 January 2018 - 24 January 2018, . CL1.01: Abstract - Women's representation and performance in the judiciary in China is an under-researched area of ...

Reflective Writing

30 January 2018 - 30 January 2018, . : Have you been asked to write reflectively and are not sure what it entails? Have you already tried some reflective ...

Structuring your assignment

01 February 2018 - 01 February 2018, . : Do you need help planning and structuring your assignments? Do you want to develop your skills?

Employer fair: Work Opportunities, Graduate Roles and Placements

01 February 2018 - 01 February 2018, . : The above fair offers you the opportunity to speak to potential employers and find out about suitable careers, ...

CINAHL: an introduction to searching the literature for health students (evening)

05 February 2018 - 05 February 2018, . : Do you want to find journal articles on health-related topics?

Teesside Email Cyber Safety



Many of you will have already attended the Universities Information Security training programme (if you are new to the organisation and have yet to book on click here) and hopefully found it useful. The training highlights the pitfalls of being online and how to avoid being the victim of criminals and scammers. The whole thrust of that training is to equip people with the skills to recognise when something is wrong and when to proceed with caution. That personal vigilance is in many ways the last line of defence. However, this is a world of defence and counter-attack. To that end the University will be implementing some enhanced security features in the coming weeks and months.

The first of these is something called email advanced threat protection and it offers two levels of protection Safelinks and Safe Attachments.


This feature checks all external links (URLs) in an email for references to malicious or other dubious websites. You might notice links that look like the one below.

Even safe links will display in this new format, if on clicking the link is classified as safe you will be taken to the target website.  However, if the link is suspicious you will be greeted with this instead.


Safe Attachments

This feature looks at attachments received (externally) in a similar way. E-mail attachments are inspected by an automated process in a virtual environment to see if the recipient opening it would trigger malicious activity like downloading code to your PC, or interfering with the workings of your PC.  If it looks malicious the attachment will be stripped out of the email.

As a result of this feature some external attachments might be slightly delayed while inspection and testing is performed.

As with any kind of service like this there will be occasional false positives, and false negatives so common sense should still be applied when opening messages especially if you are unsure of the content and sender.

The second layer of protection is automated anti-phishing protection.

Phishing is where nefarious third parties attempt to trick people into revealing logon details. These invariably happen via the medium of a fake email purporting to come from a trusted organisation (your bank or the University IT Service!) with a link in it to reset your id and password. Hopefully the Safelinks feature already described will catch these but just in case the delivery route is different the University is implementing a tool that will prevent web access to known malware sites. An example of what that looks like is shown below.
2017-01-04 14_25_31-Web Page Blocked.jpg

Finally, the third layer of protection is Multi-Factor Authentication (MFA).

A nefarious third party who has managed to get their hands on your userid/password can in theory use those details to access University resources. A small subset of resources is available externally i.e. without having to be onsite and will shortly be protected by MFA as part of a rolling program including CRM, Outlook Web access, Unity, Terminal services.

So what is it? Basically to gain access to a protected University resource externally you will need your userid, password and a third factor which is a physical item. In our case, and for greatest accessibility, that third factor will be a mobile phone. Thus a thief who has your id and password is unlikely to also have access to your mobile phone and therefore will not be able to gain access to protected resources. Clearly, this protection comes at the price of inconvenience but the costs of a data breach (under the coming changes to the data protection act) and the damage to reputation are extremely severe. Training and guidance will be provided in advance of any changes so as to cause minimum disruption as will be making the MFA experience as slick as possible.