We have observed a new wave of scam emails (known as Business Email Compromise or BEC) in NUS, some of which unfortunately involved individuals falling prey and leading to personal financial loss. Unlike phishing emails, these scams do not require you to click on any link or provide any credentials. Instead, they usually start with an innocuous message like “Are you available” and continue as a plea for help should one reply. Eventually, the scammer will attempt to convince and trick the victim into purchasing iTunes gift cards on their behalf. To add credibility, the emails are seemingly sent from someone of authority like the Head of Department using a spoofed email address.
Trend Micro Apex One
Trend Micro Apex One Trend Micro Apex One is a next-generation endpoint security solution that protects your desktops and notebook computers from security risks. Apex One leverages Trend Micro’s Smart Protection Network™ to provide up-to-the-second global threat intelligence directly to your endpoint. It provides protection against zero-day vulnerabilities, virus, malware,
Encrypt File (WinZip for Mac)
Encrypt File (WinZip for Mac) Step 1 Open WinZip and click on “New Zip File”. Step 2 Choose a filename and location for the zip file. Click on “New”. Step 3 Click on “Add”. Step 4 Choose the files you wish to encrypt. Check the Encrypt option. Specify a STRONG
Encrypt File (WinZip for Windows)
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Protect Your Data Secure Hard Disk Disposal
Secure Hard Disk DisposalSecure Disposal of Hard Disk using Blancco Drive Eraser It is mandatory to erase and destroy all University data stored in the storage media before disposal. For redeployment of hard disk, use Blancco for secure erasure. For disposal of any functional or non-functional hard disk that the
Protect Your Data Secure File Removal
Secure File Removal When you delete a file, the file references are deleted and the space formerly occupied by the file is marked as being free. However, the actual file data remains intact on the media until the space is claimed by some other file (at which point the original
Protect Your Data Mac Folder Encryption
Mac Folder EncryptionCreating an encrypted folder in Mac Run Disk Utility from Applications -> Utilities.Click on “New Image”. Choose a filename and location for the encrypted folder.Choose a name to describe the folder. Choose a suitable size for the folder. Choose “256-bit AES encryption” option for Encryption. Click on Create.
Encrypting Flash Drive
Encrypting Flash Drive A USB flash drive or thumbdrive is a portable device for storage and is often used to transfer data from one system to another. The typical thumbdrive does not offer any protection and any lost thumbdrive will result in the leakage of data. ATTENTION! NUS staff are
Protect Your Data File Encryption using WinZip
Enryption with WinZip WinZip is one of the popular and trusted ways to encrypt files for both windows and mac pc users. It is available for installation on NUS-owned computers. WinZip supports AES (Advanced Encryption Standard) encryption which provide stronger cryptographic security than the traditional Zip 2.0 encryption method. Comparing
Defer Email Delivery
Defer Email Delivery Defer your outgoing emails and place them on hold in your Outlook’s Outbox. The outgoing emails will only be delivered after X number of minutes based on your preferred configuration. Within X number of minutes, you may edit or delete the email before re-sending it. Below are the steps to configure it.
