Monday 5 October 10:00, Marco Pires on "Mobile Cyber Security" - Mobile Security, safety on the move

Link to Training Video

Marco's FAQs from after his training video

Q. Should we at all times mask our IP addresses?
A. It is not always necessary to hide IP addresses at all times, it is however good to understand how IP addresses work or what they are used for.

Q. Can you switch off time stamping on photos?
A. There are setting on your phone to switch off time stamping, however some meta-data is still stored in photos.

Q. Is it possible to eliminate all risk of being hacked?
A. There is always some form of risk but it is important to minimise the potential risk.

Q. How can you avoid downloading malware?
A. Do not download applications directly off of a website. Always use Play Store and Apple App Store.

Wednesday 14 October 10:00, Frans Roodt on "Remote working and Cyber Security" - Halt the Hacker

Link to training

Link to PowerPoint Presentation

Link to Pre and Post Test - (will close today)

Please feel free to e-mail Frans with any questions that you might have - frans.roodt@nwu.ac.za

Tuesday 20 October 10:00, Edward Jantjie on "Phishing" - Phishing, Think before you click

Link to training

Question and Answers (if any) - to come after the event

Monday 26 October, choose your own schedule, Khipu Course on "Advanced Phishing Awareness Course" (will continue into November)

Link to training will be send out during this week

Winners of R500 TakeAlot Vouchers - Week 1

  • Paul Buys
  • Charles Mokwena

Winners of R500 TakeAlot Vouchers - Week 2

  • Rynhard van Zyl
  • Elne van Niekerk

Get advice from the experts to improve your online safety. Answer a few simple questions to get personalized online safety recommendations. It is confidential - no personal information is stored and we won't access any of your online accounts.

What's your personal backup plan? Don't get hooked. Securing mobile devices. Will your password be unbroken? Preventing device theft. Guard your privacy online. Secure computing with VPN. Guard your privacy when offline or traveling.

How to break the cycle! "The reality is that we’re all constantly under attack from cybercriminals and the proof is in your inbox."

"Despite the great strides the world has made in the fight against spam, as of 2018 Cisco Talos reports spam makes up 85% of all daily email, with most originating in the United States, followed... read more

Beware of Phishing emails - Take note of the examples for identification purposes.

This would indicate that you are a victim of a social engineering attack and phishing, please be very careful and weary which sites and email links you follow or which attachments you open, as in... read more

Phishing: What to look out for

" Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive... read more

Computer Security: Steps you can take to protect yourself

"Scammers, hackers and identity thieves are looking to steal your personal information - and your money. But there are steps you can take to protect yourself, like keeping your computer software... read more

Cyber Security #4 - Phishing

Phishing attacks continue to pose a significant security threat because they are effective—particularly targeted phishing attacks like... read more

Cyber Security #3 - Secure computing with VPN

Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history,... read more

Cyber Security #2 - Guard your privacy online

Practice good online safety habits with these tips and advice:

Keep a clean machine. Protect your personal information. Connect with care. Be web wise. Be a good online citizen.

... read more

Cyber Security #1 - Secure Your Mobile Device

With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips... read more

What is phishing emails?

Phishing is a scam where e-mail is sent to people to fool them into revealing private information that can be used for identity theft.  In this video, you will learn about Phishing and how to... read more

Picture of a hand stating Stop Ransomware

Stop Ransomware

"Ransomware is a type of attack that encrypts your computer, phones, or mobile devices. Hackers will then demand that you pay a ransom to regain access to your information. Once a device is... read more

Online Cyber Security Advice

Online Cyber Security Advice

The internet is a shared resource, and securing it is Our Shared Global Responsibility.

LOCK DOWN YOUR LOGIN Your usernames and passwords are not enough to protect key accounts like email... read more

Picture for physical security

Beef up your physical security

With the threat of hacking, malware, phishing, and other digital threats constantly looming, it can be easy to overlook the importance of communicating physical security. A few basic physical... read more

Cybersecurity 101 Cyber Privacy

Learn what can happen when you post information online with this video from the NOVA Cybersecurity Lab. When you upload something to a social media site, that information is stored on the website’... read more

Cybersecurity 101 Cyber Codes

Cybersecurity 101 Cyber Codes

Learn how encryption keeps online information private in this video from the NOVA Cybersecurity Lab. Your messages are coded by email programs and websites to prevent others from reading them.... read more

The secret life of hackers

Learn about different types of hackers with this video from the NOVA Cybersecurity Lab. Hacking is solving problems in creative or unexpected ways. Hacks have been used for everything from Galileo... read more

Cybersecurity 101

Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses... read more

Watch out for the "con game"

Watch out for the "Con Game"

A social engineer runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social... read more

Ransomware picture

Ransomware: isn’t going away any time soon!

A Closer Look: Ransomware Statistics 2016 – 2017

Ransomware emails spiked 6,000%  A study by IBM Security found that the numberof ransomware-infected emails increased 6,000 percent... read more

Phishing Scams Even Fool Tech Nerds— Here’s How to Avoid Them

You know not to click on links in sketchy emails

Everybody knows that. And yet, people fall for these phishing attacks all the time. Case in point: The FBI suspects a phishing email is how the... read more

Photo of cyber security

Securing mobile devices

Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history,... read more
IT CARES about your CYBER safety!

IT CARES about your CYBER safety!

We are all familiar with viruses, but have you ever heard of phishing, identity theft or ransomware?  These are all terms used to describe issues related to IT Security. Read more on our IT... read more

Update your antivirus in 4 easy steps!

Update your antivirus

Stay up-to-date on your Security Software. Follow these four easy steps. (Applicable for Windows 7,8 and 10.) Staff can contact your IT service desk if you experience any problems and students can... read more

Adware

Adware Do's and Don'ts

Adware infections can compromise both the usability of your computer and network usage.

Many people might ask if adware is a virus?  Does it delete my files? What do I do now that I have it... read more