In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Application Security Guidelines
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Account and Access Control Guidelines
To view the contents of this post, you must be authenticated and have the required access level.
2FA Guidelines
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
NUS IT Security Policy
To view the contents of this post, you must be authenticated and have the required access level.
NUS Mobile Device Security Policy
To view the contents of this post, you must be authenticated and have the required access level.
Guidelines For Acceptable Use
To view the contents of this post, you must be authenticated and have the required access level.
NUS Acceptable Use Policy (AUP)
To view the contents of this post, you must be authenticated and have the required access level.
IT Security Awareness E-Learning | IT Security
Utility Storage Service | NUS Information Technology
The management of documents in NUS has always been a Herculean task. When faced with the demands of an enterprise system, the traditional way of filing and managing such an enormous amount of documents will inevitably have its limitations. Utility Storage Service is an alternative to backing up data to hard disks. It is a network-based service that can be accessed from anywhere in campus, from machines connected to the campus network.