New Search

If you are not happy with the results below please do another search

ICTO Knowledge Base

Archive for category: InfoSec Tips

1

Information Security Tips (Jan 2025) – Protecting Campus Information Security

Information security is essential for protecting our personal data and the university’s confidential information. We need to work together to ensure our data and privacy are not threatened. Here are some security tips to help everyone to maintain campus information security: Protect Information Security: Do not engage in or attempt any actions that could harm the […]

2

Information Security Tips (Nov 2024) – Protect Personal Online Privacy

In today’s digital era, protecting your online privacy is more important than ever. Whether you are a student or staff, understanding potential privacy risks and taking proactive steps can help to protect your personal information. Here are some practical tips: Limit Information Sharing:  Only provide necessary information online or on social media. Avoid sharing sensitive information like ID number […]

3

Information Security Tips (Sep 2024) – Protect Personal Data to Avoid Identity Theft

In today’s digital age, protection of personal data is becoming more important. Identity theft can lead to financial loss, reputational damage, and even legal liability. Therefore, we must take appropriate measures to protect personal data and avoid identity theft. At the same time, it is equally important to protect others’ identities to prevent yourself and others from […]

4

Information Security Tips (July 2024) – Important Tips for Ensuring Travel Safety

No matter where we are, cybersecurity is an important issue that cannot be ignored. Here are some cybersecurity tips: Update the software on your mobile devices, including antivirus software, as these updates often contain security fixes. Use strong passwords and avoid using passwords that are easy to guess. Enable multi-factor authentication services to protect your accounts. Backup your […]

5

Information Security Tips (May 2024) – Security Considerations When Using Public AI

Artificial intelligence (AI) platforms provide users with a variety of powerful tools and services that can help them to accomplish a variety of tasks, from data analysis to machine learning. However, there are some security risks to be aware of when using public AI platforms. Below are some security tips to protect your data and privacy: Choose a reputable […]

6

Information Security Tips (March 2024) – Advice for Securing a System

In today’s digital environment, it is very important to ensure the security of your system. By following the below advice, you can significantly enhance the protection of your system and data. Enable Strong Authentication:  Use strong password and consider other authentication mechanisms such as multi-factor authentication (MFA) to add an extra layer of security when accessing […]

8

Information Security Tips (November 2023) – Protect Your Digital Assets: A Guide for Data Backup

Important data loss can occur anytime, data backup is an important measure to prevent data loss caused by equipment failure or data damage, ensuring valuable information will not be lost forever. Data backup also provides the last protection for cyberattacks (especially ransomware attacks), allowing you to recover the data and resume daily operations quickly. Proper data backup […]

9

Information Security Tips (October 2023) – Beware of Ransomware Attacks

Ransomware attacks are one of the most common types of cyber attacks in recent years. Attackers use various network intrusion techniques or methods such as impersonation and fraud to deploy ransomware programs to organizations and users, encrypt the data on the infected computer system, so that the affected systems will not be able to operate normally, and extort […]

10

Information Security Tips (September 2023) – Beware of Spear Phishing

What is Spear Phishing Attack? Spear Phishing is a specific type of Phishing Attack that targets individuals or organizations with the intention of deceiving them and gaining unauthorized access to sensitive information. Unlike regular phishing attacks, spear phishing is more personalized and involves tactics such as impersonation, enticing bait, and finding ways to bypass security measures like email […]