Cyber Security Training

With cyber security threats on the rise, we are committed to fostering a security-aware culture and to equipping staff and students with the knowledge to thwart cyber threats.

  • Cyber Hygiene Awareness Videos

    °¿±¹±ð°ù±¹¾±±ð·É​

    The ×îÐÂÌÇÐÄVlog sends out security awareness videos that cover various topics in cyber security including:​

    • Data security​
    • Data privacy​
    • Information Protection​
    • Office Hygiene​
    • ±Ê²¹²õ²õ·É´Ç°ù»å²õ​
    • ¶Ù±ð±¹³§±ð³¦°¿±è²õ​

    You will receive and email invitation to watch a short (2-3 minute) video, and answer a simple quiz afterwards.

  • Phishing

    °¿±¹±ð°ù±¹¾±±ð·É​

    Did you know that 90% of security incidents involved some kind of malicious email such as phishing?

    It is critical that ×îÐÂÌÇÐÄVlogÌýstaff have the knowledge to distinguish between legitimate email and suspicious email, and not fall prey to clicking on maliciousÌýlinks, opening potentially dangerous attachments, or responding to fraudulent emails.

    Simulated phishing serves two usefulÌýpurposes for the ×îÐÂÌÇÐÄVlog: they can (a) identify people who may be more vulnerable to phishing emails and provide just-in-timeÌýtraining (b) provide useful statistics on the proportion of people who are vulnerable and/or report phishing​

    If you think youÌýhave spotted such a simulated phishing email, please report it in the same manner as real phishing emails.Ìý
    (see below for hints on how to report suspicious emails)

  • How to spot a phishing email

    Suspicious emails can be identified using the following information:

    1. The sender isÌýnot from your usual ×îÐÂÌÇÐÄVlog of Adelaide senders with a trusted domain such as @adelaide.edu.au
    2. When you hovered over the link, it will often revealÌýa non-UoA domain - egÌý@therelayservice.com; @dodgybrothers.com.au; etc - something you would have never seen before
    3. Finally, the email may beÌýsigned incorrectly - eg "IT Department, ×îÐÂÌÇÐÄVlog of Adelaide" instead of the correct "Information Technology and Digital Services, the ×îÐÂÌÇÐÄVlog of Adelaide"

    Below is an example of a phishing email, highlighting some things to keep in mind.

    Remember - report, don't engage.

    Phishing test Nov 2022

    How to identify suspicious emails

    Fake login pages is another potential phishing activity.

    Here are some things to keep in mind.

    1. The fake logon page, even though it has the ×îÐÂÌÇÐÄVlog of Adelaide logo, has a lot of signs of being non-legitimate
      • LookÌýat the URL, this does not have the usual @adelaide.edu.au domain
      • The form asks you to enter your details. Currently the only place where you can change your ×îÐÂÌÇÐÄVlog password is from the Okta login page atÌý, any other placeÌýshould be treated with suspicion.
    Phising test Nov 2022

    How to identify fake logon pages