Skip to content
Search for:
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & Resource Management
ITD – Kuantan Campus
ITD – Gambang Campus
ITD – Pagoh Campus
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
GOOGLE Ambassador & AI Champions
Gemini AI and NotebookLM – An Introduction
GOOGLE Ambassador & AI Champions
Roles & Responsibility
Itinerary
Materials
ISMS
ISMS – An Introduction
ISMS – Objectives
ISMS – Boundaries
ISMS – Governance Structure
ISMS – Role, Responsibility & Authority
ISMS – System Scope Statement
ISMS – Detailed Scope
ISMS – Important Dates
ISMS – How to Identify Security Incident?
HOME
ABOUT US
Office of CD/IO
Office of the Director
Office of Sections
Application Core Enablers
Collaborative & Database
Network & IT Support
Cybersecurity & Email Management
Administration & Finance
Quality Assurance & Customer Care
Data Centre & Resource Management
ITD – Kuantan Campus
ITD – Gambang Campus
ITD – Pagoh Campus
Organisational Chart
IT GOVERNANCE
2026 IT Almanac
ICT Regulation, Policies, Procedures & Guidelines
Quality Management Services
Standard Operating Procedure in IIUM
ITD Quality System
ICT Controlled Items
IT Project Management
IT Change
ICT Service Level Agreement (SLA)
e-publication
ICT Services Catalog
IIUM ICT Strategic Plan
ITD Newsletter
ITD Achievements
IIUM BookStack
IT Awareness
FORMS
EVENTS
FAQ
GOOGLE Ambassador & AI Champions
Gemini AI and NotebookLM – An Introduction
GOOGLE Ambassador & AI Champions
Roles & Responsibility
Itinerary
Materials
ISMS
ISMS – An Introduction
ISMS – Objectives
ISMS – Boundaries
ISMS – Governance Structure
ISMS – Role, Responsibility & Authority
ISMS – System Scope Statement
ISMS – Detailed Scope
ISMS – Important Dates
ISMS – How to Identify Security Incident?
Search for:
Back
Secure AI Prompting at Work
Device Clean-up & Storage Management
Spotting Fake Login Pages
QR Code Phishing (Quishing)
What Is Cyber Hygiene
Beware of Fake “Support Calls”
Choosing Trusted Apps Only
The Risk of Pirated Software
Safe Use of Personal Devices at Work
Importance of Two-Factor Authentication
https://division.iium.edu.my/itd/wp-content/uploads/sites/16/2026/02/Importance-of-Two-Factor-Authentication.png
Lock Your Screen When Away
Dont share your password
Password Managers 101
Recognizing Unsafe Websites
Importance of Antivirus Endpoint Protection
Avoiding Public WiFi Risks
Safe Internet Browsing
Ransomware recovery stories
How to Create a Strong Passphrase
Importance of Strong Passwords