九州影院

Menu

Wananga landing Wananga landing
Topic

Use secure networks and devices when browsing

02 September 2024

Be careful what device and network you use for 鈥榮ensitive鈥 browsing like internet banking or accessing your university email. It's best to do this on your own device or one that's been allocated to you by UC. Learn more about secure networks and devices when browsing.

HOW TO APPLY

You should be careful on what device and network you do 鈥榮ensitive鈥 browsing. Sensitive browsing includes internet banking or accessing your university email for example and should be done on your own device or one that has been allocated to you by the University.

Using a computer or phone that belongs to a friend or stranger, or using an untrusted network like free public WiFi (that doesn鈥檛 require a password to use), could put you at risk of having your information captured by someone else. Consider how 鈥榗lean鈥 the device and network is you are accessing.

Internet activity on your device could be visible while using public WiFi. Experts warn against accessing your accounts that need passwords or doing any internet financial transactions such as internet banking or shopping while using public WiFi. Only use wireless/WiFi from sources you trust. Using public WiFi that doesn鈥檛 require a password can provide identity thieves with the opportunity they need to view your credit cards details or steal your identity.

The potential costs to you (and others) of being hacked:

  • You could find all your data has been deleted or encrypted and held for ransom.
  • The University network could be locked down 鈥 stopping staff and students from being able to work 鈥 and requiring millions of dollars and weeks or months to fix.
  • You could lose access to your banking and social media accounts.
  • Your identity could be stolen
    • Loans and credit cards may be opened in your name (which you are held legally liable for) 鈥 imagine discovering that you owe hundreds of thousands of dollars and are legally required to pay it back?.
    • Your credit record could be tarnished.
    • Unauthorised purchases may be billed to you.
    • You may become a victim of tax fraud.
    • You may be locked out of apps and web-based services, forever!! (Losing family photos, thesis papers etc. Do you have these backed up??).
  • Your electronic devices may be used as a tool of cyber-crime (sending spam or spreading malware).
  • You could suffer damage to your personal reputation, career opportunities, and relationships.
  • You could be used as a conduit to other cyber-crimes and criminal activities (including possible sex trafficking, child exploitation, money laundering, terrorism, etc).
  • You could be used as a cover for cyber-bullying or exploitation.
  • You could be exposed to increased risk of mental health issues, self-harm/suicide (due to emotional fall out of being a victim of crime).
Hand on keyboard

How to Report a Cybersecurity Incident

Ring听the IT Service Desk

0508 UC IT HELP (0508 824 843) or
03 369 5000

Visit听the IT Service Desk
located in the ground floor of Matariki

Log a ticket
on听

Privacy Preferences

By clicking "Accept All Cookies", you agree to the storing of cookies on your device to enhance site navigation, analyse site usage, and assist in our marketing efforts.