You should be careful on what device and network you do ‘sensitive’ browsing. Sensitive browsing includes internet banking or accessing your university email for example and should be done on your own device or one that has been allocated to you by the University.
Using a computer or phone that belongs to a friend or stranger, or using an untrusted network like free public WiFi (that doesn’t require a password to use), could put you at risk of having your information captured by someone else. Consider how ‘clean’ the device and network is you are accessing.
Internet activity on your device could be visible while using public WiFi. Experts warn against accessing your accounts that need passwords or doing any internet financial transactions such as internet banking or shopping while using public WiFi. Only use wireless/WiFi from sources you trust. Using public WiFi that doesn’t require a password can provide identity thieves with the opportunity they need to view your credit cards details or steal your identity.
The potential costs to you (and others) of being hacked:
- You could find all your data has been deleted or encrypted and held for ransom.
- The University network could be locked down – stopping staff and students from being able to work – and requiring millions of dollars and weeks or months to fix.
- You could lose access to your banking and social media accounts.
- Your identity could be stolen
- Loans and credit cards may be opened in your name (which you are held legally liable for) – imagine discovering that you owe hundreds of thousands of dollars and are legally required to pay it back?.
- Your credit record could be tarnished.
- Unauthorised purchases may be billed to you.
- You may become a victim of tax fraud.
- You may be locked out of apps and web-based services, forever!! (Losing family photos, thesis papers etc. Do you have these backed up??).
- Your electronic devices may be used as a tool of cyber-crime (sending spam or spreading malware).
- You could suffer damage to your personal reputation, career opportunities, and relationships.
- You could be used as a conduit to other cyber-crimes and criminal activities (including possible sex trafficking, child exploitation, money laundering, terrorism, etc).
- You could be used as a cover for cyber-bullying or exploitation.
- You could be exposed to increased risk of mental health issues, self-harm/suicide (due to emotional fall out of being a victim of crime).
How to Report a Cybersecurity Incident
Ring the IT Service Desk
0508 UC IT HELP (0508 824 843) or
03 369 5000
Visit the IT Service Desk
located in the ground floor of Matariki
Log a ticket
on UC Services Portal