ITS

End User Policies

End User Policies IT Security Policy Acceptable Use Policy (AUP) Guidelines For Acceptable Use Data Management Policy (DMP) DMP Appendices Mobile Device Security Policy Guidelines for personal computers & equipment

Policies | IT Security

In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…

Security Incidents Reporting | IT Security

Security Incidents Reporting Cyber security incidents can lead to damage of University reputation and disrupt business operation. University data may be exposed, accessed or modified without  authorization and knowledge.  NUS Staff and Students should report any security incidents immediately. How do I report a security incident? You can report any security

I want to… | IT Security

I want to… Welcome to the self-help section. Department should perform continuous risk assessment on NUS data and system; that is to assess if the protection measures to safeguard NUS data and system are sufficient with reference to NUS IT Security Policy and guideline. Department should raise exemption request should

Trend Micro OfficeScan | IT Security

Trend Micro OfficeScan Trend Micro OfficeScan is a centrally managed software, protecting desktops and notebook computers from security risks. OfficeScan protects computers from viruses/malware and malicious code, including file viruses, macro viruses, and malicious Java™ applets and ActiveX™ controls. Additionally, you can rid your computer of spyware and grayware, which are

IT Security Awareness Talk | IT Security

IT Security Awareness Talk Have you clicked on a phishing email? Or heard stories from victims of ransomware or digital currency mining? We are conducting regular IT Security Awareness Talk with aim of increasing staff and students awareness on trending cyberattack techniques and knowledge on protection measures. IT Security Awareness Talks materials are available for download here: Date Venue

Phishing

PhishingWhat is phishing? Phishing is a type of social engineering attack used to steal user information, including personal data and login credentials. Such attacks are typically initiated with an email, instant message, or text message sent by the attacker. The recipient is then usually tricked into clicking a malicious link,

Systems Policies | IT Security

Systems Policies | IT SecurityGeneral Security Guidelines 2FA Guidelines Application Security Guidelines Log Management Guidelines Website Security Guidelines Operating System Policies Windows 2016 Baseline Security Standard v2.1 Windows 2016 Baseline Security Standard v1.1 Windows 2019 Baseline Security Standard 1.0 Cent OS 7 Baseline Security Standard 1.0 Cent OS 7 Baseline

ITS Microsite Template

DEEP LEARNING BEST PRACTICES: CHECKPOINTING YOUR DEEP LEARNING MODEL TRAININGWhat Needs to be Saved H6 Subheading H7 subheading (orange) H8 subheading (black) This article covers one of many best practices in Deep Learning, which is creating checkpoints while training your deep learning model. We will look at what needs to