Skip to Content
Guide on Secure Video Conferencing

icon of Guide on Secure Video ConferencingGuide on Secure Video Conferencing

Video conferencing (VC) is becoming an effective way of communication for remote working and for users at different locations to conduct real-time communications...

Security of Remote Working

icon of Security of Remote WorkingSecurity of Remote Working

In view of the recent outbreak of coronavirus, many organisations have arranged for their employees to work remotely to achieve social distancing...

Data Breach

icon of Data BreachData Breach

Data breach is a suspected breach of sensitive data by exposing the data to the risks of accidental loss, or unauthorised or accidental access, processing, erasure or use.

Identity Theft

icon of Identity TheftIdentity Theft

Identity theft is a criminal act of getting hold of personal data of others without their knowledge or permission with an intent to defraud.

Beware of Phishing Attacks

icon of beware of phishing attacksBeware of Phishing Attacks

Phishing is one of the most common cyber attacks nowadays which targets all Internet and email users.

Security of DNS

icon of security of DNSSecurity of DNS

DNS stands for “Domain Name System”. It resolves human-readable Internet domain and host names to machine-readable Internet Protocol (IP) addresses and vice versa.

Safe Mobile Payment Services

iconSafe Mobile Payment Services

Though the mobile payment services have adopted cutting-edge security technology, users should enhance their information security awareness and put sufficient security measures in place to avoid any monetary loss.

Play Mobile Games Safely

icon of Play Mobile Games SafelyPlay Mobile Games Safely

Apart from introducing the information security risks of mobile games, this course also provides good practices on using mobile games with a view to facilitating users to enjoy mobile games safely.

Protect Yourself against Ransomware

icon of Protect Yourself against RansomwareProtect Yourself against Ransomware

Ransomware is a malicious software that cyber criminals used to encrypt files stored on the infected computer devices. These encrypted files are like hostage and the cyber criminals will demand the user to pay a ransom to unlock them…

Beware of Malware Infection

icon of Beware of Malware InfectionBeware of Malware Infection

Malware can cause different level of security risks to computer assets, such as disrupt computer operations, gather sensitive information, etc. This course introduces the threat and cause of malware infection. Security tips to protect your computing device from malware, including ransomware infection will also be provided.

Safe Online Shopping

learning icon Safe Online Shopping

As people can enjoy the convenience of shopping at online store, there are associated security threats and risks to aware. This course introduces security risks of online shopping and provides consumers with suggested precautions and good practices, so that they can enjoy a reasonably safe online shopping experience.

Safe Online Banking

icon of Safe Online Banking Safe Online Banking

Online banking can be a convenient way to manage finances and transactions from anywhere.  But if users do not take adequate precautions, they may fall into the traps of cyber criminals.  This course reminds users with the security threats and good practices to protect their financial information and assets when using online banking services.


Safe Social Networking

icon of Safe Social Networking Safe Social Networking

It is often said that sharing is good. But if users are not mindful about what and how they share in cyber world, they run the risk of hurting themselves or someone else. This course reminds users with the security threats and good practices when using social networking services.

 

Back to Top