Staying safe online

Use this section to learn how to protect yourself online during your study, and check out Curtin’s IT policies which are designed to keep you and your learning environment protected from cybercriminals.

Refer to the ICT Appropriate Use Guidelines [.pdf 800KB]  for a quick overview of the do’s and don’ts when it comes to using Curtin’s ICT assets.

Tips to stay safe

Your information is valuable to cybercriminals, especially things like your credit card, your social media page, and your online account details and passwords. To help defend against cybercriminals and make yourself less of a target, we’ve provided some simple tips to keep yourself safe online.

Click wisely Click only links and files that are expected, and only from people you trust.

If you receive an email which seems too good to be true, it’s probably a scam. This type of scam is called phishing, and the goal is to get you to click on a fraudulent link, open an unsafe file, or give up personal information. Things to look for include:

  • Fear of losing money or winnings.
  • Requests to verify accounts details or credit card numbers.
  • Files or links that require you to download additional software to view them.
  • Links that are close but not quite right e.g.,

View the latest email and SMS phishing campaigns at the Stay Smart Online website.

Apply updates Set your software to auto-update. Install updates, and restart if needed.

Software updates help fix flaws in the software’s code that could make you vulnerable to security breaches. For specific assistance on how to turn on auto updates on your devices or system at Curtin or home, contact your local Curtin IT support team.

Use strong passwords Create passwords that are unique and hard to guess. Use two-step verification where it’s available.

It’s important to create strong passwords to keep your information protected. If you use the same password across multiple accounts and a cybercriminal gains access to one account, they’ll be able to access them all. It’s easy to manage different passwords by using a password manager, and you can further increase your security by enabling two-step verification.

Know your data Be careful what you share, and secure sensitive data. If you don’t need it, delete it.

Some types of information you can share with the world, other information needs to be kept private. Be careful when sharing personal details via social media as this information could be used to steal your identity. Regularly back up your data in different locations, and delete anything you don’t need.

What should I do if something suspicious happens on my computer or mobile device?

If you notice any of the below activities occurring, you need to act ASAP:

  • Suspicious activity occurring with your computer or phone.
  • An unexpected loss or modification of data.
  • Access of data by people who should not have access.
  • Unexpected account login attempts.
  • Finding you are locked out of an IT system or account.

If the suspicious activity relates to your Curtin login details or any Curtin systems, contact Curtin IT services immediately on (08) 9266 9000.

If the suspicious activity relates to your personal IT device or personal online accounts, please contact your relevant service provider, and seek professional assistance from an IT professional. If you believe a crime has occurred, please contact your local police station.

Curtin’s IT policies exist to keep you safe

Our information security processes and systems are designed to keep your safe while online and on campus, so take the time to read our key IT policies including:

The Information Security & Information & Communication Technology (ICT) Appropriate Use Policy which sets out the expectations to ensure your IT learning environment remains secure, your fellow students aren’t harmed or adversely impacted by your use of Curtin’s IT systems and your passwords and information remains secure.

The Information and Communications Technology (ICT) Appropriate Use Procedures which set out expectations on what is appropriate use of IT learning environment systems, what is not appropriate use and expectations for personal devices used within your IT learning environment.