To view the contents of this post, you must be authenticated and have the required access level.
NUS Acceptable Use Policy (AUP)
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data Secure Hard Disk Disposal
Secure Hard Disk DisposalSecure Disposal of Hard Disk using Blancco Drive Eraser It is mandatory to erase and destroy all University data stored in the storage media before disposal. For redeployment of hard disk, use Blancco for secure erasure. For disposal of any functional or non-functional hard disk that the
Protect Your Data Secure File Removal
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data Mac Folder Encryption
To view the contents of this post, you must be authenticated and have the required access level.
Encrypting Flash Drive
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data File Encryption using WinZip
To view the contents of this post, you must be authenticated and have the required access level.
Encrypt Window Drive (BitLocker) | IT Security
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Loss or Leakage of University Data Reporting | IT Security
Loss or Leakage of University Data Reporting For incidents involving personal data, report to NUS Data Protection Office. Refer here for further details. (VPN required when accessing off-campus) For incidents not involving personal data, report to NUS IT via the online form. If you are in doubt, please: Contact NUS
Defer Email Delivery
Defer Email Delivery Defer your outgoing emails and place them on hold in your Outlook’s Outbox. The outgoing emails will only be delivered after X number of minutes based on your preferred configuration. Within X number of minutes, you may edit or delete the email before re-sending it. Below are the steps to configure it.