In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
End User Policies
End User Policies IT Security Policy Acceptable Use Policy (AUP) Guidelines For Acceptable Use Data
Policies | IT Security
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Security Incidents Reporting | IT Security
Security Incidents Reporting Cyber security incidents can lead to damage of University reputation and disrupt
I want to… | IT Security
I want to… Welcome to the self-help section. Department should perform continuous risk assessment on
Trend Micro OfficeScan | IT Security
Trend Micro OfficeScan Trend Micro OfficeScan is a centrally managed software, protecting desktops and notebook
Report suspicious emails via Report Phishing button in Outlook | IT Security
__PRESENT __PRESENT
IT Security Awareness Talk | IT Security
IT Security Awareness Talk Have you clicked on a phishing email? Or heard stories from
Ray Template
EFFICIENT PROCESSING OF LARGE NEXT GENERATION SEQUENCING DATASETSBy Kar-Tong Tan, Ying Li, Prof. Henry Yang
Phishing
PhishingWhat is phishing? Phishing is a type of social engineering attack used to steal user