Skip to content
Search for:
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & Resource Management
ITD – Kuantan Campus
ITD – Gambang Campus
ITD – Pagoh Campus
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
GOOGLE Ambassador & AI Champions
Gemini AI and NotebookLM – An Introduction
GOOGLE Ambassador & AI Champions
Roles & Responsibility
Itinerary
Materials
ISMS
ISMS – An Introduction
ISMS – Objectives
ISMS – Boundaries
ISMS – Governance Structure
ISMS – Role, Responsibility & Authority
ISMS – System Scope Statement
ISMS – Detailed Scope
ISMS – Important Dates
ISMS – How to Identify Security Incident?
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & Resource Management
ITD – Kuantan Campus
ITD – Gambang Campus
ITD – Pagoh Campus
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
GOOGLE Ambassador & AI Champions
Gemini AI and NotebookLM – An Introduction
GOOGLE Ambassador & AI Champions
Roles & Responsibility
Itinerary
Materials
ISMS
ISMS – An Introduction
ISMS – Objectives
ISMS – Boundaries
ISMS – Governance Structure
ISMS – Role, Responsibility & Authority
ISMS – System Scope Statement
ISMS – Detailed Scope
ISMS – Important Dates
ISMS – How to Identify Security Incident?
Search for:
Next
Spotting phishing emails
Ransomware recovery stories
Cybersecurity + wellness connection
Reducing digital distraction
Social media oversharing risks
Real ransomware attack examples
Common malware types
Using VPNs safely
Why reusing passwords is risky
What is an insider threat
Password Phishing
Reporting suspicious emails
Ransomware as a Service
Email misdelivery risks
Multi-factor authentication in cloud apps
What to do if your password is leaked
Acceptable use of organization’s devices
USB and external device risks
Handling sensitive information safely