
CJ
- Total activity 766
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 392
Articles
Recent activity by CJ Sort by recent activity-
How to protect your device from malware
Malware (or “malicious software”) is an umbrella term that describes any malicious program or code that is harmful to systems. Malware seeks to invade, damage, or disable computers, computer system...
-
How to avoid social engineering attacks
Social engineering is the act of manipulating and tricking unsuspecting victims into sharing confidential and/or sensitive data. Social engineering attacks typically involve forms of psychological ...
-
How to keep your devices and software up-to-date
Software updates are supplied to apply fixes to known application, browser, and operating system security vulnerabilities. They also deploy new or enhanced features, remove outdated features, and i...
-
How to use public wi-fi networks securely
Many businesses (e.g. airports, coffee shops, libraries, and shopping centres) offer free Wi-Fi for their customers to use. This is good for getting you online quickly and cheaply but they’re also ...
-
How to browse the web securely
There’s no getting away from web browsers in the workplace. Whether you’re checking your emails on Office365, booking annual leave on MyHR, or searching for IT Support on our Knowledge Base, web br...
-
Why am I seeing a 'Suspicious activity detected' message upon sign-in?
If when logging in you see a message reporting that suspicious activity has been detected: ...then Multi-Factor Authentication (MFA) has been enabled on your account. Please follow this guide ...
-
Why am I seeing a ‘Your sign-in was blocked’ message upon sign-in?
The Multi-Factor Authentication (MFA) system has detected something unusual about your sign-in. This might have been triggered if you are trying to access your account from a new location or device...
-
Why am I seeing a ‘Approve sign-in request’ message upon sign-in?
Multi-Factor Authentication (MFA) is been enabled on all staff accounts. When you use your account in a new location or on a different device, you maybe prompted to verify your identity. This will ...
-
Why am I seeing a ‘We didn’t hear from you’ message upon sign-in?
You will see this message when you sign-in to University resources and have not responded to a message to ‘Approve sign in request’. This is Multi-Factor Authentication (MFA) in action and has been...
-
The physical side of cybersecurity
Cybersecurity isn't all about computers, devices, and software. There's a physical side to protecting your and the University's sensitive information from unauthorised use. Give yourself an immedia...