Safety Tips

Safety First

  • If you suspect your UMmail account has been hacked or just want to make sure it hasn’t, please regularly check your UMMail Last Account Activity record.
  • Click here for more information.

  • Keep your computer updated with the latest anti-virus and anti-spyware software, and be sure to use a good firewall.
  • You need at least 3 components to ensure proper PC security. Click here for more information
  • Get anti-virus software from PTM(Only for UM computers - UM staff)– To make a request, go to UM Helpdesk. Click here
  • Never open an email attachment unless you are POSITIVE about the source.
  • Do NOT download freeware or shareware unless you know it's from a reputable source

Don't wait until you lose hours or even years of work in a single moment:-

  • Make copies of your important information, documents and data on portable media (CD, DVD-ROM, thumb drives and external hard drives are ideal).
  • Store these copies in a separate location.

  • Malware, or malicious software, is hostile, intrusive, or annoying code that includes viruses, spyware, adware, worms, trojan, horses, and other unwanted programs.
  • Malware spreads rapidly and by many different ways: for example,e-mail attachments;infected document files; Web sites that contain hostile code that can infect your computer through vulnerable browsers; and unprotected file shares.
  • To get the most benefit from your antivirus software ensures it is updated regularly and is operating as intended.
  • Be cautious about peer-to-peer sharing networks
  • The goal of a phishing scam is to steal your valuable personal data, such as credit card numbers, passwords, account data, and other information.
  • If you think you've received a phishing e-mail message, do not respond to it.

      Click Here to Read More​​

Be careful when using Social Networking Websites such as Facebook, Twitter & MySpace.

  • Limit the amount of personal info you post
  • Customize Privacy Option settings & try to limit access
  • Beware of fake pages : these are the sites built by those whose main objective is to steal identity for unlawful financial gains.

  

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

                          
For more detail, please click RULES AND REGULATIONS FOR THE USE OF ICT FACILITIES

Last Updated: 29/10/2019