ISSUE 16  ♦ Jun 2019

Focus Topic

Protecting Your Account with Two-Factor Authentication (2FA)

2FA works in a simple way using something you know (username and password) and something you have (a registered device) for two steps’ authentication. The diagram below shows how 2FA works. Here we have taken UM 2FA Service as an example.


IT Security

Beware of Phishing Trap

“Phishing” is a trick in social engineering. Cybercriminals usually use phishing to trick the victim into some kind of expected behaviour. Social engineering is the core of all phishing attacks, especially via email. The advancement of information technology makes [...]

Service Updates


Events Updates

From April to June 2019, ICTO has organised following meetings. On 17 April 2019, the 3rd SUFG meeting for Academic Year 2018/2019 was held. In the meeting, ICTO’s representatives shared the following information: Launch of 15th Issue of ICTO [...]

Introduction of ICTO Services