Look for signs
- Websites that are not secure.
Malware is malicious software that compromises the operation of a system by performing an unauthorised function or process.
Today's smart phones and tablets are essentially handheld computers. Because of their portability and convenience, people often store personal data on them – such as private photos and videos, address books, passwords, email and personal calendars. But, like laptop and desktop computers, these devices need to be protected from security threats.
Passwords are used for the security of all staff and students. Your password must be kept secret and must not be given anyone else – not even to an ICTS staff member. Research, financial and other UCT critical files are saved on network drives and it is therefore important to ensure that only authorised people log on to the network. This means that all UCT staff and students are responsible for keeping the network secure. (Read the UCT Account and Password Policy for full details concerning password policy statements.)
Patches and Updates
Software programmes and operating systems are vulnerable to attack, which is why developers regularly release patches and updates. It is very important that you install updates as soon as they become available to ensure the security of your data and to protect the UCT network from attack.
Phishing is an attempt to get you to hand over personal, confidential information to a criminal. The requests may seem legitimate and may be perpetrated by phone, email or via the internet. The danger lies in the fact that these phishing attempts look legitimate, sometimes even carrying an official-looking logo, and that they con you into providing information to fraudsters that you would not normally give to anyone else.
We'd all like to believe that our mobile device or computer will never get stolen, but theft is a reality. By taking the necessary precautions, you can protect yourself from such crime.
Ensure safety settings are in place
In both the personal and professional world, social media have made a significant impact in the way we communicate and network. And while it's very easy to set yourself up on sites like Facebook or Twitter, it's not such fun configuring your account and privacy settings – which is why it's tempting to simply choose the site's default options, or decide that you'll deal with it "later" (whenever that may be).
Spam is the practice of sending unwanted email messages, in large quantities, to an indiscriminate set of recipients. Some spam can also include malware or viruses that are loaded onto your computer without your knowledge.
Stay Safe Online
Computing devices are an essential part of modern life. We use smart phones, tablets and computers to work, play, organise and communicate &endash; with a vast array of functionality at our fingertips whenever we need it, no matter where we are.
Update your Antivirus
The University of Cape Town has a license agreement with Intel Security to allow us to use McAfee anti-virus products for the Operating Systems (OS). Regular updates of the software ensures that your computer is always protected from the latest threats. View these step-by-step instructions on how to install and manage these anti-virus products.
Virus Protection for Mobile Devices
UCT does not offer an anti-virus solution for mobile devices such as smart phones, tablets and other handheld devices. Customers making use of these devices need to make their own arrangements for anti-virus protection.
How to Spot a Phishing Email
The last thing you want to hear is that money has been illegally removed from your bank account, or to find that your identity is being used to fraudulently obtain goods or services.