Identifying odd behaviour
The common thread across all cyber security protection is to be alert and think about your online life and experience. Use your own experience and discuss with others the digital world we live in to identify strange behaviour and imposters.
If something seems odd, it probably is odd
Things to look for when using computers and other devices:
- Is your device performing slower than normal?
- Does your device seem to be going through battery faster?
- Are you getting random pop-ups?
- Is your device crashing more often?
- Changes to your internet home page browser
- New toolbars on your internet browser
- Higher than normal data usage
- Unusual messages or programmes that start by themselves
- Is your security software disabled?
- New or unfamiliar icons or apps
- Storage space is unexpectedly running low
If you think a device you use might be showing some of these signs, report it to a technical support team. At UC you can report issues in the following ways.
It is just as important to report odd behaviour around computers and devices. This could include:
- People using log in details that aren’t their own.
- ‘Tailgating’, when a person tags along with another person who is authorized to gain entry into a restricted area
- Someone inserting USB devices in equipment so it is hidden.
- Copying data from a controlled source onto portable storage, i.e. USB storage device
- People watching others closely, possibly recording, when logging into a system.
- If you are contacted by “IT Support” – remember, you will never be asked for your password by any UC support teams or other organisations.
How to Report a Cybersecurity Incident
Log a ticket
on the IT Self Service portal
Visit the IT Service Desk
located in the Central Library
Email us on firstname.lastname@example.org
with the phishing email attached and ensuring header of scam email is included
Ring the IT Service Desk
0508 UC IT HELP (0508 824 843) or
03 369 5000