Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Search results
Overview
Reporting suspicious online activity
IT Services encourages you to report any suspicious online activity using the reporting features built in to the different apps and services that you use at the University.
This guide will demonstrate how to report suspicious emails, and further down the...