Browsing the internet connects you with millions of other users and computers around the world. Some of these users choose to exploit this connectivity for malicious purposes such as stealing data or manipulating IT systems.
Here are some examples of security threats, how to avoid them and how to report them.
Malware is any unwanted software that is installed without the user’s consent. It is used to disrupt computer operations, collect data or otherwise gain unauthorised access to computer systems.
Email: Cybercriminals are notorious for including malicious attachments and links in emails that appear to come from trusted sources.
Websites: Many websites exist which if visited will attempt to infect your computer with malware. When browsing the internet ensure that you visit only trustworthy sites.
Unsecured networks: Connecting to unknown networks can leave your device vulnerable to malware. Public wireless access points are especially insecure.
Phishing is attempting to maliciously acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity.
It is imperative that you act quickly to protect your Flinders University account.
Spamming refers to the use of electronic messaging systems (email) to indiscriminately send unsolicited bulk messages (spam), especially advertising.
At the University, 70-80% of our emails are rejected as spam. Although most of the spam sent to Flinders University email addresses is filtered, some of it may inadvertently slip through.
Spam can easily be identified by:
Spam and phishing emails are closely linked and are often confused however may both have undesirable consequences to University and personal information.
Stay vigilant, do not follow links or open attachments in emails that you do not recognise.
Spyware gathers information about a person or organisation without their knowledge and may send this information to another entity without consent. Spyware is a form of malware.
The University maintains anti-virus and email filtering technology to minimise the likelihood of spyware infections.
You can further reduce risk of infection when using a University device by:
To report a phishing email, we ask that you use the Microsoft Junk Add-in that is available on University staff computers running Microsoft Outlook on Windows and from any computer using Outlook Web Access (OWA). OWA is available from your Okta dashboard.
Select the suspicious email in Outlook
Click on the 'Junk' button and select the 'Report as Phishing' option
Click on the 'Junk' button and select the 'Phishing' option
The email will be deleted and a copy will be forwarded for analysis
Opening hours: 8am to 5.30pm, Monday to Friday, excluding public holidays
After hours or when all staff are busy you will be given an option to leave a voicemail message. Voicemails will be accessed as soon as practical during business hours otherwise you may choose to log an IT support request.
You consent to the use of our cookies if you proceed.