Why partner with Information Security?

Published: November 11, 2024

A group of people having a discussion in the library.

Overview

Research dollars are finite, expectations are significant, competition is fierce and cyber risks are growing. Support is available to help create and sustain advantages for your research while lessening the administrative and technical burdens. Information Security provides advice, assistance and services related to the current and future cyber security realities of research to improve your competitiveness and productivity.

Key benefits

  • Meet requirements

    With the changing nature of cyber threats, sponsors, funding agencies and data providers continue to increase research cyber security compliance requirements. Working with suitable institutional research infrastructure, and the support of Information Security and other research support staff, allows you to understand and meet your cyber security requirements and obligations.

  • Protect assets

    Protecting the integrity of your research data from unauthorized or accidental change or deletion, whether malicious or benign, poses a risk to the success of your projects, reputation and expected timelines to complete, publish or patent. Additionally, the confidentiality of your research data and intellectual property, particularly prior to publication and distribution, is likely a concern given the loss of opportunity that could occur if others publish first. Engaging with Information Security on how to adequately protect your data allows you to focus on advancing your research and achievements while covering cybersecurity risks and minimizing losses.

  • Reduce costs

    Data loss, ransomware, intellectual property theft, unexpected downtime and not meeting agreement requirements are just a few examples of the costly consequences of inadequate and/or insufficient cyber security practices. Recovering from incidents can be (1) financially costly due to the lost time dedicated to redoing experiments or attempting to recover data, or the loss of the ability to patent your work, and (2) reputationally costly due to no longer being viewed as a trusted collaborator, partner or data recipient. Effective cyber security practices help to reduce the likelihood of such incidents and their associated cost and damage.

  • Improve competitiveness

    With the increase of cyber security requirements and compliance burdens, the unfortunate reality is that funding and access may not be awarded solely on the strength of your scholarship but also depends on your ability to meet these other obligations. In collaboration with divisional and institutional colleagues, Information Security strives to provide language and support to thoroughly address cyber security obligations so that you can compete on the strength of your research alone.