Safety Tips

  1. Never share your password with anyone. Guard your password just as you guard your bank card PIN
  2. Never say “yes” when your browser asks you if you’d like to save your password.
  3. How do I clear my browser’s cache memory?
  4. Never write your password down.
  5. Never send your password in email, even if the request looks official.
  6. Fun ways to create a Strong & Memorable password
  7. Change your password often. Guide on how to change your UMmail password
  8. Never Give Out Your Password. Poster Don't Give Password
  1. To know whether your computer has the basic security features or not, it is advisable for you to audit your pc.
  2. Download Microsoft WindowsSecurity Audit Checklist For PC
    How to download Microsoft Windows Security Audit Checklist?
    How to fill Microsoft Windows Security Audit Checklist?
     
  3. If you need help, PTM ICT Security Team can provide you & your PTJ with PC Security Audit Services session to assess pc security at your departmental level. Email to ICT Security for more information.
  1. Keep your computer updated with the latest anti-virus and anti-spyware software, and be sure to use a good firewall.
  2. You need at least 3 components to ensure proper PC security.
  3. Get anti-virus software from PTM(Only for UM computers - UM staff)– To make a request, go to UM Helpdesk. Click HERE
  4. Never open an email attachment unless you are POSITIVE about the source.
  5. Do NOT download freeware or shareware unless you know it's from a reputable source

Be careful when using Social Networking Websites such as Facebook, Twitter & MySpace.

  1. Limit the amount of personal info you post
  2. Customize Privacy Option settings & try to limit access
  3. Beware of fake pages : these are the sites built by those whose main objective is to steal identity for unlawful financial gains.
  1. If you suspect your UMMail/Siswa Mail account has been hacked or just want to make sure it hasn’t, please regularly check your UMMail Last Account Activity record.
  2. Click here for more information.

Don't wait until you lose hours or even years of work in a single moment:-

  1. Make copies of your important information, documents and data on portable media (CD, DVD-ROM, thumb drives and external hard drives are ideal).
  2. Store these copies in a separate location.

Keeping your operating system up to date is critical. Running whatever antivirus you have in your computer is NOT enough. You can configure your computer to automatically seek out updates.

  1. How to manually check for windows 10 updates
  2. How to manually check for windows 8 & 8.1 updates
  3. How to manually check for windows 7 updates
  1. The goal of a phishing scam is to steal your valuable personal data, such as credit card numbers, passwords, account data, and other information.
  2. If you think you've received a phishing e-mail message, do not respond to it.
  1. Malware, or malicious software, is hostile, intrusive, or annoying code that includes viruses, spyware, adware, worms, trojan, horses, and other unwanted programs.
  2. Malware spreads rapidly and by many different ways: for example,e-mail attachments;infected document files; Web sites that contain hostile code that can infect your computer through vulnerable browsers; and unprotected file shares.
  3. To get the most benefit from your antivirus software ensures it is updated regularly and is operating as intended.
  4. Be cautious about peer-to-peer sharing networks
                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

Versi Bahasa Malaysia

Untuk keterangan lanjut,sila klik PROSEDUR PENGURUSAN INSIDEN KESELAMATAN MAKLUMAT

English Version

For more detail, please click INFORMATION SECURITY INCIDENT MANAGEMENT PROCEDURE

Versi Bahasa Malaysia

Untuk lebih terperinci, sila klik DASAR KESELAMATAN ICT UM

English Version

For more detail, please click  UM ICT SECURITY POLICY

Versi Bahasa Malaysia

Untuk lebih terperinci, sila klik :- PERATURAN DAN KAEDAH PENGGUNAAN KEMUDAHAN ICT

English Version

For more detail, please click :- RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES