Backup your data, and update regularly
Ensure that your information is protected from cyber attacks, by backing up regularly and installing updates as they become available.
Protect your username and password
Go the extra mile in securing your online accounts, using multi-factor authentication (MFA).
UCT Information Security policy
The Information Security policy is aimed at protecting the UCT network, its digital assets and your information.
Stay updated with the latest phishing attacks
Keep track of what phishing attacks the UCT Computer Security Incident Response Team (CSIRT) is investigating.
Video conferencing safety recommendations
Recommendations to remember when setting up or participating in web conferences.
Home > home


Saturday, 22 January 2022
Social media scams

Cybercriminals can be anyone they want when communicating on social media. All they need to know is who your contacts are, how you know each other and then they embark on their attack. While you think that you are talking to Jade Pops, you’re actually talking to a person you have never met before. Jade’s profile is just being used as a front to get close to you.

Publication Date:
Tue, 07 Apr 2020 - 08:15
Wise up about who has access to your data

Our lives revolve around technology. We send instant messages via WhatsApp. Our thoughts and carefully composed photographs are shared via Facebook, Twitter and Instagram. We ask Siri to find the best route home and Alexa to remind us to get milk, bread and speckled eggs.

Publication Date:
Tue, 28 Jan 2020 - 07:15
Cybersecurity Month takes place this October

Welcome to Cybersecurity Month. Every year, we dedicate the month of October to raising awareness about information and cybersecurity-related matters, by providing you with guidance on how to avoid becoming a cybercriminal’s next target.

Publication Date:
Mon, 30 Sep 2019 - 14:30
UCT making strides in cybersecurity

Cybercrime is on the rise and higher education institutions continue to be at high risk of being attacked not only for their data, but also for their IT infrastructure, which if accessed, can aid cybercriminals with their illegal activities.

Publication Date:
Fri, 24 May 2019 - 08:15