ISSUE 12 ♦ Jun 2018
Protecting Your Account from Password Compromise
Password is the first line of defence against cyber-attacks. Keeping your password safe and secure is very important. If your password is compromised/ disclosed to someone else, your identity, personal information and valuable data can be stolen. Once someone knows your account password, your account can also be used in illegal activity.
Launch of Open Data API Platform
In April 2018, ICTO has launched the Open Data Application Programming Interface (API) platform. UM staff and students can access the public data of UM through this platform and develop innovative applications using their creativity. Current available UM [...]
Browsing the Webpage with the HTTPS – Encrypted Connection
When a user browses a web page or uses an online service, the web browser establishes a connection with the server. If web address starts with "https://", it means that the connection is encrypted. If it starts with "http://", it [...]
Don’t Fall into the Third-Party Mobile Applications Trap
ICTO’s Information Security Team received an information security notification about a third-party mobile app that provides information services to the students of higher education institutions in Hong Kong. It offers discounts for shopping and offers coupon, job vacancy information to [...]
New myUM Portal – the Gateway to the Information Systems
New myUM Portal is launched. It allows users to access the web-based campus information systems quickly and easily. Most of the services links are placed on one page for easy access. You can login to myUM Portal with your UMPASS [...]
Enhancement and New Third-Party Plugins on UMMoodle and Community
Layout Enhancement of Quiz Activity on UMMoodle ICTO has fixed the button display of Quiz activity in iOS devices and enhanced the Quiz activity's layout in UMMoodle. This enhancement was suggested by CTLE’s academic advisors. After the enhancement the [...]
JUCC – Steering Committee Meeting Held in UM
A JUCC Steering Committee Meeting was held on 4 May 2018 in the University of Macau. IT Directors and senior IT staff from different Hong Kong universities and education institutions gathered at the University of Macau and discussed various aspects [...]
ICTO Participated in Asia Alliance 2018 Conference
Asia Alliance 2018 on IT application and services is an annual conference organized by the Higher Education User Group (HEUG). Conference was held on 8 May 2018 in Hong Kong. The Higher Education User group (HEUG) is an international organization [...]
The 3rd Student User Focus Group (SUFG) Meeting for Academic Year 2017/2018
To share latest updates regarding ICTO services and facilities, collect feedback and suggestions from students, ICTO holds Student User Focus Group (SUFG) meetings regularly. On 18 April 2018, the 3rd SUFG meeting for Academic Year 2017/2018 was held. In the meeting, [...]
The 4th Academic IT Support Advisory Group (AITSAG) Meeting for Academic Year 2017/2018
ICTO holds Academic IT Support Advisory Group (AITSAG) meetings regularly to share the experience and knowledge between support staff from academic units and ICTO in an interactive way. On 24 April 2018, the 4th meeting for Academic Year 2017/2018 was held. [...]
Tips for Using IT Services during Travelling and Off-Campus
ICTO prepared a number of tips for you to prepare your trip and a number of recommendations for protecting your computer data during off-campus access. Planning Your Trip Email You can use Outlook Webmail (https://staffmail.umac.mo) to access your emails [...]
Key Points for Conducting Online Meeting
To provide users with the best experience when conducting online meetings, ICTO provides following suggestions to colleagues and students for reference: 1. Ensure a good network environment Online meeting relies on network performance and quality of network directly [...]
Tips for Improving Your Computer’s Performance
Performance of a computer slows down and there can be many factors, such as too many applications being launched when computer starts-up, lots of trash and temporary files are accumulated, virus or malicious code inflection etc. Here are some [...]