Cyber/Internet Security Awareness

Dear Staff and Students

The frequency and complexity of cyber attacks is increasing globally and this calls for increased security awareness and adherence to security standards and best practice procedures put in place. Although most of these attacks are happening in the developed world,attackers are increasingly taking advantage of African users due to lack of wide-spread cyber security awareness on the continent. DICTS is closely following these security trends and working closely with the Computer Emergency Response Team at the National Information Technology
Authority- Uganda (NITA-U) to keep users informed on how to best protect both personal and University ICT resources. This being a research institution that generates a lot of data,it's important that each user plays their role in protecting both their personal and University ICT resources from intrusion by unauthorized personnel and cyber-related attacks.

This year,there has been an increase in the number of destructive ransom-ware variants such as;

1. Locky

2. Samas and

3. Mamba

which infect computers belonging to individuals and businesses.
Ransom-ware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it!
Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting/recovering files does not mean the malware infection itself has been removed.


It is recommended that users and administrators take the following preventive measures to protect their computer networks from ransomware

1)For Systems Administrators: Employ a data backup and recovery plan for all critical information. Perform and test regular backups to limit the impact of data or system loss and to expedite the recovery process. Note that network-connected backups can also be affected by ransom-ware; critical backups should be isolated from the network for optimum protection.

 For the regular end-user: Make sure the data on your computer is backed-up either on an external hard-drive or preferably on the cloud using some cloud storage solution such as

Dropbox (,

Google Drive ( ,

One Drive ( etc. This will enable you to recover your documents should something go wrong with your computer.Please remember to backup your emails too.

2) Keep your operating system and software up-to-date with the latest patches. Vulnerable applications and operating systems are the target of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker.

3) Maintain up-to-date anti-virus software, and scan all software downloaded from the internet prior to executing.Please visit to download the University security solution.

 Follow the links below for:

(i)   Information on safe handling of email attachments
(ii)  Good Security habits
(iii) Safeguarding your data

4) Do not follow unsolicited Web links in emails. Follow the link below for tips on avoiding Social Engineering and Phishing Attacks

You are encouraged to contact DICTS for ICT related advise and support.