Security Advice and Best Practice
IT Security from a Personal Perspective
- Physical Security
- Managing & Protecting Your Computing and Storage Devices
- Setting up and using Computer Account & Password Properly
- Six Steps to Secure Your Computer
- Be aware of Ransomware
- Be a Smart Internet User
- Dos and Don'ts of Information Security Awareness
- Protecting Privacy - Using Computers and the Internet Wisely
- Protecting Online Privacy - Use Social Network Sites Smartly
Security Advice for Staff Handling Personal Data
- Information Classifications and Handling
- Protect restricted or confidential information with password and encryption.
- Dispose restricted or confidential information carefully after use
- Erase all data stored in handheld smart devices and reset the devices before disposal or recycle use
Security advice for Webmasters
- Awareness of Web Site Security
- Information Protection Practices for Web Content Providers
- Protecting Information from being cached by Public Search Engines
- Removal of Cached Information from Public Search Engines
Policies, Guidelines and FAQ
- Q&A related to the Use of Zoom for Online Teaching and Learning
- Information Security Policies and Standards
- Personal Data (Privacy) Issues
- Policy on University Intellectual Property and Related Matters
- Policies on Use of IT Services and Resources
- Screen Saver Protection Guidelines
- Security Guidelines for Setting Up IT Systems in Academic Departments