Skip to content
Search for:
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & IT Resource Management
IT Kuantan
IT Gambang
IT Pagoh
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & IT Resource Management
IT Kuantan
IT Gambang
IT Pagoh
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
Search for:
Back
Spotting phishing emails
Ransomware recovery stories
Cybersecurity + wellness connection
Reducing digital distraction
Social media oversharing risks
Real ransomware attack examples
Common malware types
Using VPNs safely
Why reusing passwords is risky
What is an insider threat
Password Phishing
Reporting suspicious emails
Ransomware as a Service
Email misdelivery risks
Multi-factor authentication in cloud apps
What to do if your password is leaked
Acceptable use of organization’s devices
USB and external device risks
Handling sensitive information safely