Home > News
Cybersecurity Month showcased on UCT radio
Fri, 20 Oct 2017 - 15:15

Information and Cyber Security senior manager, Roshan Harneker was interviewed on Cybersecurity Month on UCT Radio this week. Catch the chat HERE

Beware of pop-ups while browsing online
Wed, 11 Oct 2017 - 15:00

Hackers are using different methods to gain access to your information. Their latest attempt is using a bogus Microsoft pop-up that appears while you’re browsing online. It warns you that your device is either blocked or infected, and that it can only be resolved if you call the provided telephone number.

Ensure the websites that you browse are secure
Wed, 04 Oct 2017 - 15:15

When using Chrome to browse online, if the current website address starts with http instead of https, an exclamation mark will appear next to the URL. This feature applies to normal browsing as well as Incognito mode, and will occur on computers only (i.e. not mobile devices).

10 top tips for staying cyber secure
Thu, 28 Sep 2017 - 14:45
Be password savvy

Your passwords are the locks and keys to your online life, so they need to be secure! The longer and more complex your password is, the better. A password should contain numbers, symbols, and upper-and-lower-case letters. Using a passphrase can help you to remember complex passwords.

Remember to never use the same password for multiple accounts. If you have trouble remembering passwords, you can use a password manager to help store and manage them. Never leave your password written down or lying around, and never share a password with anyone – not even your best friend.

Protecting your Android device
Tue, 26 Sep 2017 - 15:45

At UCT, the majority of malware spread by mobile gadgets occurs on Android phones and devices. Google has introduced Google Play Protect, which began rolling out in August 2017 to all Android devices running Android version 7 and later.

Cybersecurity at UCT
Fri, 22 Sep 2017 - 15:15

Since the beginning of 2017, over 1100 security incidents were reported to the UCT Cybersecurity and Incident Response Team (CSIRT). Fourteen of these were classified as high risk, while the rest were either medium or low risk.

It could happen to you
Fri, 22 Sep 2017 - 15:15

Subject lines such as Security alert, Change your password immediately, or Urgent action required often prompt us to immediately open emails to see what is wrong or what action is required. However, this is the kind of urgent language that hackers often use to get victims to act.

Sharing is caring: spread the word about cyber threats
Mon, 18 Sep 2017 - 16:00

As humans, when we care about something, we’re often eager to share our viewpoints with others. From humanitarian causes to social justice campaigns, political perspectives and more, we often feel that what’s important to us should also be important to others – so we’re eager to spread the word.

Stop cyber threats in their tracks
Mon, 18 Sep 2017 - 16:00

In today's tech-driven world, convenience goes hand in hand with risk. We can communicate with loved ones far away, receive up-to-the-minute updates on events locally and abroad, and even get all our shopping done online without stepping out of our homes. But, if we're not careful, we run the risk of having our privacy invaded, our identity stolen, and money taken from our bank accounts by enterprising criminals who use the very same technology for malicious ends.

6 tips to master password security
Tue, 12 Sep 2017 - 08:30

Follow these six tips to ensure you have uncrackable passwords for your online accounts.

IT Security Basics: A Basic IT Security Awareness Program for Your Employees
Tue, 11 Jul 2017 - 15:45

As a business owner, you have probably heard that your staff are the weakest link when it comes to security. In my opinion this is not true, your staff, if trained well, can be the most effective security you can have.

Help, I’ve got a virus! What to do if your business is attacked
Tue, 11 Jul 2017 - 15:15

How would your business respond if you got a virus? Far too many businesses wait until they've already suffered a cyber attack to think about that question. By then, the damage is already done: when a virus hits your systems, every second counts.