Cyber Security Training

With cyber security threats on the rise, we are committed to fostering a security-aware culture and to equipping staff and students with the knowledge to thwart cyber threats.

  • Cyber Hygiene Awareness Videos

    °¿±¹±ð°ù±¹¾±±ð·É​

    The University sends out security awareness videos that cover various topics in cyber security including:​

    • Data security​
    • Data privacy​
    • Information Protection​
    • Office Hygiene​
    • ±Ê²¹²õ²õ·É´Ç°ù»å²õ​
    • ¶Ù±ð±¹³§±ð³¦°¿±è²õ​

    You will receive and email invitation to watch a short (2-3 minute) video, and answer a simple quiz afterwards.

  • Phishing

    °¿±¹±ð°ù±¹¾±±ð·É​

    Did you know that 90% of security incidents involved some kind of malicious email such as phishing?

    It is critical that UniversityÌýstaff have the knowledge to distinguish between legitimate email and suspicious email, and not fall prey to clicking on maliciousÌýlinks, opening potentially dangerous attachments, or responding to fraudulent emails.

    Simulated phishing serves two usefulÌýpurposes for the University: they can (a) identify people who may be more vulnerable to phishing emails and provide just-in-timeÌýtraining (b) provide useful statistics on the proportion of people who are vulnerable and/or report phishing​

    If you think youÌýhave spotted such a simulated phishing email, please report it in the same manner as real phishing emails.Ìý
    (see below for hints on how to report suspicious emails)

  • How to spot a phishing email

    Suspicious emails can be identified using the following information:

    1. The sender isÌýnot from your usual ³ÉÈË´óƬ senders with a trusted domain such as @adelaide.edu.au
    2. When you hovered over the link, it will often revealÌýa non-UoA domain - egÌý@therelayservice.com; @dodgybrothers.com.au; etc - something you would have never seen before
    3. Finally, the email may beÌýsigned incorrectly - eg "IT Department, ³ÉÈË´óƬ" instead of the correct "Information Technology and Digital Services, the ³ÉÈË´óƬ"

    Below is an example of a phishing email, highlighting some things to keep in mind.

    Remember - report, don't engage.

    Phishing test Nov 2022

    How to identify suspicious emails

    Fake login pages is another potential phishing activity.

    Here are some things to keep in mind.

    1. The fake logon page, even though it has the ³ÉÈË´óƬ logo, has a lot of signs of being non-legitimate
      • LookÌýat the URL, this does not have the usual @adelaide.edu.au domain
      • The form asks you to enter your details. Currently the only place where you can change your University password is from the Okta login page atÌý, any other placeÌýshould be treated with suspicion.
    Phising test Nov 2022

    How to identify fake logon pages