Safer Internet Kampala report 2

REPORT Experts and Enthusiasts in Tech share differet ways they protect online info Net2 Uganda Safer Internet FY15.pdf

November 5th 2014

  • The organizers had to do some
    background reading so as to make sure that when the info is shared, they are able to explain it.
  • The technicality of the info received
    from I-Network prompted the organizers to include a selected group of soci0- techies. This was on Facebook and LinkedIn

Main Presenters
Ednah Karamagi
Experts and enthusiasts in
they protect online info

  • The post was accepted on
    the I network
  • Members
    posted actively and we got several pieces of advise
  • The target group was
    spot on in the sense that they indeed shared the technical aspect of the topic

tech share different ways
No of attendees
All members subscribed to the dgroup.
This was approved in the later part of the same day
The responses were too technical even for us the organizers
A group that brings
together people who are
experts in or enthusiastics
about technology, and
especially computing to
learn and share from each
other different ways how
information stored online
can be protected
On 4th November 2014, the post was submitted for moderation to the I- Network dgroup.
Advise generated from the three platforms to be posted on Twitter is: –

o Encrypt your data wherever it is online or local storage medium. You can start by encrypting your hard drive5
o Use your own storage systems drive6 Disable location apps on all your phones and
Instead of using passwords, use

o Fingerprints7. Opt to use an application
that stores prints for all your fingers and a password for emergency. Google for options
o Voice recognition

o Face recognition. This doesn’t deal with
hair but the face…distannce between the
eyes, nose, and other parts.

Third-party cookies are one of the most common methods that are used to track your browsing
habits. If you visit two sites using the same service, rest assured that members will keep tabs on that information. To avoid this,
o use a firewall integrated in your ati virus o the website browser to block the

o use Tactical Tech or with caution that the more apps that record your net usage online in the name of protection, the slower your system gets.
Create smart and strong passwords. Make it difficult for hackers to crack your password. o You can create a smart password by
incorporating capital letters, numbers, and special characters, and using more

  • Be cautious that any information you place online enters the public space and security is at best tenuous, at worst non-existent
  • Run your computer under a non-administrative account (ie setup a non-administrative user account on your computer and use this account for all day-2-day computer activities). This helps prevent unwanted exploits installing while you are using the computer
  • Always ensure when entering information into a web that the site is encrypted. This will be evidenced by the web address starting with https: (not http:)
  • Run a local firewall, install updates regularly and install an up-to-date virus scanner set to ‘auto- scan’ file accesses and online content.
  • Wherever possible encrypt all email messages (Google how depending on your email client of choice)
  • Do not open email attachments from unknown sources, and never send a password by email (no matter how many fraudulent emails you receive asking for your password!)
  • There are plenty of other good tips available at:

o The Australian Government initiative8 o TechSoup9 is also a great resource for
For passwords,
You can use two factor authentication
with SMS4

  • Remove personal information like date of birth or former places of work. This is because fraudsters will always try to break into your accounts based on information that is easily accessible to them.
  • Do not sign up for online promotions requesting for personal information. Contact the Merchant directly by phone.
  • Shred as much waste as possible.
  • You can check security settings and what history exists for your Google accounts below. story

  • Hardware theft protection, open sourced software
  • If you use 2 factor authentication, get the backup codes for emergency situations when mobile is lost or not available

1 If you are not a member of the I-Network dgroup, this link will take you to a page from where you can apply to be a member. Thereafter, you can view the full conversation at:

3 group_discussion_new_comment-see-more-link&midToken=AQFRDHq9ZmLV9g&fromEmail=fromEmail&ut=0RsAqeBwq03Cw1



7 8

Attached are results from facebook post than six characters e.g GGo1dM!n3. o Avoid generating passwords from
common words like “your name”, “phone
number”, “birthday”, etc.

o Use different password for your email
accounts and social media.

o Never sign-up on unknown platforms as
some of them are used to capture your
login details

o AND dont forget its hectic to type
complex passwords every time; let alone
remember it

  • Be smart. Avoid people peeping as you type your password, machines that have key loggers, be cautious of set up cameras
  • Make sure you Link your mobile phone number to your email and social media. This will help u to be alerted on spot if some-one is trying to hack into your respective accounts.
  • Before you share you IT equipment, make sure you have signed out at all your accounts or log- out and switch to another account and you have to make sure the those working on your computer have no Administration rights.
  • one can setup a page that looks like facebook and when you login your password is stored.It is possible and can be done. We should refrain from using other people’s computers for private matters
help in this area o Cyber Smart10
There are many options for sending encrypted email and a good list of options is available at:
o How to Geek11 o Trend Micro12

Report compiled by:
Mary Nakirya
Facebook: Twitter: @marianakirya Net2uganda Local Organizer
Ednah Karamagi
Facebook: Twitter: @ednahkaramagi Net2uganda Local Organizer



12 It is easy for mail recipients to use as well – info and a good user guide are available at: