How not to fall victim to a cyberattackWhere is your university vulnerable to ransomware or access via a third-party provider? Here are ways to reduce risk and maintain security across your IT networkNicole StewartJisc