Skip to content
Search for:
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email
Administration & Finance
Quality Assurance & Customer Care
Data Centre & IT Resource Management
IT Kuantan
IT Gambang
IT Pagoh
Organisational Chart
IT GOVERNANCE
2025 IT ALMANAC
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email
Administration & Finance
Quality Assurance & Customer Care
Data Centre & IT Resource Management
IT Kuantan
IT Gambang
IT Pagoh
Organisational Chart
IT GOVERNANCE
2025 IT ALMANAC
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
Search for:
IT Awareness
Check Hygiene Checklist
Protecting Data in M365 & Google Workspace
Secure Your Home WIFI
Stay Secure on Zoom & Google Meet
Email Overload Management
Benefits and Risks of Cloud Storage
Reporting Suspicious Emails
Importance of Strong Passwords
Social Media Oversharing Risks
Cybersecurity Do's & Donts
Risks of Public Wi-Fi
Got Hacked? Act Fast to Stay Safe!
The Dangers of Sharing Credentials at IIUM
Green IT - Activate Computer Power Saving Settings
Green IT - E-Waste Recycling Program
Enable Two-Factor Authentication on Your Accounts
IIUM E-Waste Collection Centres
E-Waste Quiz Competition 2025
What Happens When You Accept Cookies?
Digital Detox: Why and How
The Lifecycle of Your Digital Footprint
How Antivirus Software Works
Why You Must Update Software Regularly
Strong Password Creation Tips
Reporting suspicious email
Secure Cloud Storage Practices
Safe file sharing
Beware of Malicious Attachments & links
BYOD Risks
Cloud Phishing Attacks
AI-Powered Phishing
Two-factor authentication (2FA)
Safe Downloading Practices
Password Phishing