Tips on How to Tackle Rampant Computer Threats

As Technology is advancing, the demand to use computers to transact businesses is becoming more and more of a necessity and this requires safety and security best practices. How serious are you taking the security of your account(s) – it could be an email account or an online transaction system account or even your computer account. More and more threats are coming up every day to disrupt peoples businesses and destroy information resources.

At UTAMU, we employ most of the new technology advancements and it is upon us to safeguard ourselves and resources from these type of threats. 

It is therefore that I recommend some of the following tips on how to tackle the rampant threats coming up every day that goes by:

Check for viruses and malware - Run a scan on your computer with trusted anti-virus software. If the scan detects any suspicious programs or applications, remove them immediately.

Do an account security checkup – these days many email service providers have gone an extra mile to add components that can help you track how secure your account is. For example Gmail has got a “Security Checkup” section under Account preferences.

Update your account recovery options – most systems these days provide more secure ways of recovering your account in the event of forgetting your logins. For example, with email accounts, you can add a phone number as one of your recovery options – where a test or an automated call can be placed with further instructions on how to reset your password.

Use Strong Passwords – avoid writing down your passwords or sending it via email, or tell anyone. A strong password contains letters, numbers and symbols – and it should contain at least eight (8) characters long.

Protect your Passwords – avoid entering your passwords in an external links that are from untrusted sites. Always go directly to the resource links for example, or

Change your Passwords – always change your passwords regularly (every after 1 month) to prevent intruders from guessing your passwords.

Avoid connecting to any or public wireless networks that you don’t trust. Many intruders take advantage of these networks to do illegal practices such as sniffing passwords, altering information, and engaging in criminal offences.

If you use a public computer or a computer that you don’t trust, always sign out of your accounts and clear the browser histories such as forms, passwords, cache, cookies on a regular basis. 

Article by:

Waiswa Muhamood 

Technician, UTAMU

Request Information

Request FREE Information
Courses, Admission
Please select your first choice programme
Please type your first name.
Please type your last name.
Invalid email address.
Please enter your telephone number
Invalid Input

Find Us on Facebook

© 2016 Uganda Technology And Management University. All Rights Reserved.