{"id":10458,"date":"2025-12-16T07:23:26","date_gmt":"2025-12-16T07:23:26","guid":{"rendered":"https:\/\/division.iium.edu.my\/itd\/?page_id=10458"},"modified":"2026-02-05T06:36:43","modified_gmt":"2026-02-05T06:36:43","slug":"it-awareness-page2","status":"publish","type":"page","link":"https:\/\/division.iium.edu.my\/itd\/it-awareness-page2\/","title":{"rendered":"IT Awareness"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10458\" class=\"elementor elementor-10458\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8a95a00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a95a00\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fac148d\" data-id=\"fac148d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30fbc4f elementor-button-info elementor-widget elementor-widget-button\" data-id=\"30fbc4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/division.iium.edu.my\/itd\/page3-2\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-801c128 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"801c128\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-016a9fe\" data-id=\"016a9fe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bd0e39 elementor-widget elementor-widget-image\" data-id=\"1bd0e39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10460\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Spotting-phishing-emails.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Spotting phishing emails<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-54a4fb0\" data-id=\"54a4fb0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe5179b elementor-widget elementor-widget-image\" data-id=\"fe5179b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10461\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-recovery-stories.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Ransomware recovery stories<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-383da40\" data-id=\"383da40\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8218d25 elementor-widget elementor-widget-image\" data-id=\"8218d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10465\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Cybersecurity-wellness-connection.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cybersecurity + wellness connection<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-efddd1a\" data-id=\"efddd1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e54ffe elementor-widget elementor-widget-image\" data-id=\"7e54ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10470\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reducing-digital-distractions.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Reducing digital distraction<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c0198e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c0198e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-6003c01\" data-id=\"6003c01\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-577db69 elementor-widget elementor-widget-image\" data-id=\"577db69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10490\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Social-media-oversharing-risks.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Social media oversharing risks<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-a405ddf\" data-id=\"a405ddf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-709b692 elementor-widget elementor-widget-image\" data-id=\"709b692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples.png\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10474\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Real-ransomware-attack-examples.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Real ransomware attack examples<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5392472\" data-id=\"5392472\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ff04eb elementor-widget elementor-widget-image\" data-id=\"8ff04eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10479\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Common-malware-types.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Common malware types<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-fa24ba1\" data-id=\"fa24ba1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3a0658 elementor-widget elementor-widget-image\" data-id=\"b3a0658\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10483\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Using-VPNs-safely.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Using VPNs safely<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f54f1c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f54f1c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-a9051b4\" data-id=\"a9051b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68c198f elementor-widget elementor-widget-image\" data-id=\"68c198f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10494\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Why-reusing-passwords-is-risky.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Why reusing passwords is risky<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-e408a57\" data-id=\"e408a57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8093350 elementor-widget elementor-widget-image\" data-id=\"8093350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10498\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-is-an-insider-threat.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">What is an insider threat<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-54c2f03\" data-id=\"54c2f03\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6137727 elementor-widget elementor-widget-image\" data-id=\"6137727\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10502\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Password-Phishing.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Password Phishing<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-189ebb5\" data-id=\"189ebb5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1534c8c elementor-widget elementor-widget-image\" data-id=\"1534c8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10507\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Reporting-suspicious-emails.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Reporting suspicious emails<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a09d1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a09d1b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-a925fc2\" data-id=\"a925fc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a13a6de elementor-widget elementor-widget-image\" data-id=\"a13a6de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10512\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Ransomware-as-a-Service.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Ransomware as a Service<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-1872611\" data-id=\"1872611\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7a9248 elementor-widget elementor-widget-image\" data-id=\"c7a9248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10516\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Email-misdelivery-risks.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Email misdelivery risks<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-e78cc6a\" data-id=\"e78cc6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4759686 elementor-widget elementor-widget-image\" data-id=\"4759686\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10520\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Multi-factor-authentication-in-cloud-apps.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Multi-factor authentication in cloud apps<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-1bcd19c\" data-id=\"1bcd19c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57a469f elementor-widget elementor-widget-image\" data-id=\"57a469f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10536\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/What-to-do-if-your-password-is-leaked.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> What to do if your password is leaked<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ce501d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8ce501d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-c8f7e14\" data-id=\"c8f7e14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98e2a7b elementor-widget elementor-widget-image\" data-id=\"98e2a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10540\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Acceptable-use-of-organizations-devices.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Acceptable use of organization\u2019s devices<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-8238e7a\" data-id=\"8238e7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fae4a9c elementor-widget elementor-widget-image\" data-id=\"fae4a9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10528\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/USB-and-external-device-risks.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">USB and external device risks<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-99bc87c\" data-id=\"99bc87c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30aafcd elementor-widget elementor-widget-image\" data-id=\"30aafcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"1100\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely-768x1320.png\" class=\"attachment-medium_large size-medium_large wp-image-10532\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely-768x1320.png 768w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely-175x300.png 175w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely-596x1024.png 596w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely-894x1536.png 894w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2025\/12\/Handling-sensitive-information-safely.png 1080w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Handling sensitive information safely<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-2db76f8\" data-id=\"2db76f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Next Spotting phishing emails Ransomware recovery stories Cybersecurity + wellness connection Reducing digital distraction Social media oversharing risks Real ransomware attack examples Common malware types Using VPNs safely Why reusing<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":{"1":"page","2":"type-page","3":"status-publish","4":"hentry"},"_links":{"self":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/10458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/comments?post=10458"}],"version-history":[{"count":79,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/10458\/revisions"}],"predecessor-version":[{"id":12067,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/10458\/revisions\/12067"}],"wp:attachment":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/media?parent=10458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}