Home > Awareness


Look for signs

  • Websites that are not secure.


Malware is malicious software that compromises the operation of a system by performing an unauthorised function or process.

Mobile Apps

Today's smart phones and tablets are essentially handheld computers. Because of their portability and convenience, people often store personal data on them – such as private photos and videos, address books, passwords, email and personal calendars. But, like laptop and desktop computers, these devices need to be protected from security threats.

Password Management

Passwords are used for the security of all staff and students. Your password must be kept secret and must not be given anyone else – not even to an ICTS staff member. Research, financial and other UCT critical files are saved on network drives and it is therefore important to ensure that only authorised people log on to the network. This means that all UCT staff and students are responsible for keeping the network secure. (Read the UCT Account and Password Policy for full details concerning password policy statements.)

Patches and Updates

Software programmes and operating systems are vulnerable to attack, which is why developers regularly release patches and updates. It is very important that you install updates as soon as they become available to ensure the security of your data and to protect the UCT network from attack.


Phishing is an attempt to get you to hand over personal, confidential information to a criminal. The requests may seem legitimate and may be perpetrated by phone, email or via the internet. The danger lies in the fact that these phishing attempts look legitimate, sometimes even carrying an official-looking logo, and that they con you into providing information to fraudsters that you would not normally give to anyone else.

Physical Security

We'd all like to believe that our mobile device or computer will never get stolen, but theft is a reality. By taking the necessary precautions, you can protect yourself from such crime.

Social Media

Ensure safety settings are in place

In both the personal and professional world, social media have made a significant impact in the way we communicate and network. And while it's very easy to set yourself up on sites like Facebook or Twitter, it's not such fun configuring your account and privacy settings – which is why it's tempting to simply choose the site's default options, or decide that you'll deal with it "later" (whenever that may be).


Spam is the practice of sending unwanted email messages, in large quantities, to an indiscriminate set of recipients. Some spam can also include malware or viruses that are loaded onto your computer without your knowledge.

Stay Safe Online

Computing devices are an essential part of modern life. We use smart phones, tablets and computers to work, play, organise and communicate &endash; with a vast array of functionality at our fingertips whenever we need it, no matter where we are.

Update your Antivirus

The University of Cape Town has a license agreement with Intel Security to allow us to use McAfee anti-virus products for the Operating Systems (OS). Regular updates of the software ensures that your computer is always protected from the latest threats. View these step-by-step instructions on how to install and manage these anti-virus products.

Virus Protection for Mobile Devices

UCT does not offer an anti-virus solution for mobile devices such as smart phones, tablets and other handheld devices. Customers making use of these devices need to make their own arrangements for anti-virus protection.


How to Spot a Phishing Email

The last thing you want to hear is that money has been illegally removed from your bank account, or to find that your identity is being used to fraudulently obtain goods or services.


Cybersecurity Month 2019 focused on how to better manage your password. View the range of content that was produced over the five weeks in October.


During October 2020, UCT staff and students went on a phishing trip phishing trip to see which cyberattacks have been successful and how they could have been avoided. Preventative tools and tips were provided too.