IT Awareness

Check Hygiene Checklist
Protecting Data in M365 & Google Workspace
Secure Your Home WIFI
Stay Secure on Zoom & Google Meet
Email Overload Management
Benefits and Risks of Cloud Storage
Reporting Suspicious Emails
Importance of Strong Passwords
Social Media Oversharing Risks
Cybersecurity Do's & Donts
Risks of Public Wi-Fi
Got Hacked? Act Fast to Stay Safe!
The Dangers of Sharing Credentials at IIUM
Green IT - Activate Computer Power Saving Settings
Green IT - E-Waste Recycling Program
Enable Two-Factor Authentication on Your Accounts
IIUM E-Waste Collection Centres
E-Waste Quiz Competition 2025
What Happens When You Accept Cookies?
Digital Detox: Why and How
The Lifecycle of Your Digital Footprint
How Antivirus Software Works
Why You Must Update Software Regularly
Strong Password Creation Tips
Reporting suspicious email
Secure Cloud Storage Practices
Safe file sharing
Beware of Malicious Attachments & links
BYOD Risks
Cloud Phishing Attacks
AI-Powered Phishing
Two-factor authentication (2FA)
Safe Downloading Practices
Password Phishing