{"id":805,"date":"2021-08-04T17:35:00","date_gmt":"2021-08-04T14:35:00","guid":{"rendered":"https:\/\/iuea.ac.ug\/Blog\/?p=805"},"modified":"2021-09-13T17:42:08","modified_gmt":"2021-09-13T14:42:08","slug":"how-prone-is-your-organisation-to-cybersecurity-crime","status":"publish","type":"post","link":"https:\/\/iuea.ac.ug\/blog\/how-prone-is-your-organisation-to-cybersecurity-crime\/","title":{"rendered":"HOW PRONE IS YOUR ORGANISATION TO CYBERSECURITY CRIME"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Among the speakers of the day was our own officer in charge of online and distance learning, <strong>Mrs Preetima Nataraj<\/strong> who provided extensive insight into digital identity and security in Uganda and the world. Seasoned computer security and forensics expert <strong>Edison Kagona<\/strong> also gave an in-depth analysis of systems\u2019 vulnerability to cybersecurity threats.<\/p>\n\n\n\n<h4 class=\"has-text-color wp-block-heading\" style=\"color:#a95b5b\"><span style=\"text-decoration: underline\"><strong>Presentation 1<\/strong><\/span><\/h4>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#7a0000\">Understanding progress of Digital Identity and Security by Mrs Preetima Nataraj<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is a Digital Identity?<\/h3>\n\n\n\n<p><em>According to Wikipedia: A digital identity is information on an entity used by computer systems to represent an external agent. That agent may be a person, organization, application, or device.<\/em><\/p>\n\n\n\n<p>In simple terms, a digital identity is essentially any personal data existing online that can be traced back to the real you. For example, photos you\u2019ve uploaded to social media, posts you\u2019ve created or commented on, your online bank account or your search engine history.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Importance of digital identity&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Participate in socio-economic development<\/li><li>Catalyze regional and global integration in the digital economy<\/li><li>Growth and expansion of Business<\/li><li>Access digital services and support<\/li><li>Maintain control of APIs<\/li><li>Participate in user-centric platforms<\/li><li>Internet banking and payments<\/li><li>Tourism<\/li><li>Enjoying Citizenship Benefits like healthcare and insurance<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Benefits of a digital identity<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Improving efficiency<\/strong><\/li><\/ul>\n\n\n\n<p>Safeguarding data under one organized folder<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Wider inclusion and access<\/strong><\/li><\/ul>\n\n\n\n<p>Rights to access a wide range of essential services and inclusions.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Minimizing costs and regulations<\/strong><\/li><\/ul>\n\n\n\n<p>Helping businesses minimize costs and avoid litigation issues drastically.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Improving security and enhancing privacy<\/strong><\/li><\/ul>\n\n\n\n<p>Proper digital identity management improves the security and privacy of data.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>A better customer experience<\/strong><\/li><\/ul>\n\n\n\n<p>Faster turnaround times and fewer touchpoints, ensuring customers a better experience.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>High levels of accuracy<\/strong><\/li><\/ul>\n\n\n\n<p>Availability of data in one place as and when required and ensuring better compliance as manual keying errors are reduced.<\/p>\n\n\n\n<p><strong>Uganda\u2019s population on the digital economy<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/XNlgwrmBhICTS6N-7NcrAlJLPKEkApTFg2JI5AG9ie285tSmoedCthk2_3B7jkWIQony72YvmFf0yrMGEHIhOMlFimLdkcmmO_GJ4MlaArQw3_USpIhI5LnGLMPv_Npgn57ILWVz=s0\" alt=\"\" width=\"671\" height=\"477\" \/><\/figure>\n\n\n\n<p>People in rural areas and women especially do not participate in the economy due to lack of access to digital services and not owning National Digital&nbsp; IDs.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/lh4.googleusercontent.com\/GN__QBrmqaSugqdKIjxZDgk5Fv82XuBqZpv4jsCHOTOt1U9j01Z2TNfc7iciMyWl3BsjazNX6EnEZpC7fQVs4kBldT1PRIsM5SiptVNB4PFLNslNIHMMy9ODtBdBog0H8YMx5bpO=s0\" alt=\"\" width=\"585\" height=\"338\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 585px; --smush-placeholder-aspect-ratio: 585\/338;\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Uganda stepped into the digital identity scheme by introducing<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>National Electronic identity card&nbsp; in 2014 (NIC) <\/strong>(citizens of 18 + years)<\/li><\/ul>\n\n\n\n<p>Uganda\u2019s functional identity landscape is characterized by continued investment and ambition to integrate government services and databases with the central digitized national identity database.<\/p>\n\n\n\n<p>The four key functional identity systems in Uganda: biometric voter registration, business registration, access to healthcare, and financial inclusion.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>National Electronic identity number in 2015&nbsp; (NIN)&nbsp; <\/strong>(By birth)<\/li><\/ul>\n\n\n\n<p>Free and compulsory registration of every child by birth to be identified as a citizen of Uganda.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Conducting awareness program on the importance of digital identity<\/strong><\/li><\/ul>\n\n\n\n<p>Emphasizing&nbsp; the need to avail the socio-economic benefits<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Mission and vision of introducing NIN and NIC<\/strong><\/li><\/ul>\n\n\n\n<p>To enhance growth, development and security of people\u2019s data through digital identification.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How can a user protect his\/her digital identity?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Limit sharing&nbsp; the Social Security number<\/li><li>Using strong and unique passwords on each of online accounts<\/li><li>Non-usage of unprotected webpage<\/li><li>Not sharing your login credentials with others<\/li><li>Shred documents containing personal information before discarding<\/li><li>Non-usage of public or unprotected WIFI networks<\/li><li>Review permissions and privacy policies<\/li><li>Update software&nbsp; and backup data regularly<\/li><\/ul>\n\n\n\n<h4 class=\"has-text-color wp-block-heading\" style=\"color:#a95b5b\"><span style=\"text-decoration: underline\">Presentation 2<\/span>&nbsp;<\/h4>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#7a0000\">Introduction to Cybersecurity by Edison Kagona&nbsp;<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is cybersecurity?<\/h3>\n\n\n\n<p>The term cybersecurity is used to refer to the protection offered through online services to protect your online information.<\/p>\n\n\n\n<p>With an increasing number of people getting connected to the internet, the security threats that cause massive harm are increasing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is cybersecurity important?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>It helps in securing data threats such as data theft or misuse<\/li><li>Also safeguards your system against viruses.<\/li><li>Protects information from unauthorised access and disclosure.<\/li><li>Protecting information from unauthorised modification.<\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThe smaller your organisation is, the more prone it is to cybersecurity threats.\u201d&nbsp;<\/em><\/p><cite><em>-Edison Kagona Msc computer security and forensics<\/em><\/cite><\/blockquote>\n\n\n\n<p>As a pro-technology university, we emphatically foster secure cyber practices and continue to take lead in the sensitisation of the general populace about the same.&nbsp;<\/p>\n\n\n\n<p>For this reason, we will host and take part in webinars curated by people with the same vision. For more information on how to take part in or partner with us for our interventions, please contact our officer in charge of online and distance learning on <a href=\"mailto:preethimataraj@iuea.ac.ug\">preethimataraj@iuea.ac.ug<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ADESA x IUEA webinar: The IUEA cybersecurity department was pleased to join The African Data Engineering and Science Association (ADESA) for the cybersecurity webinar that was on Friday 04 June 2021. <\/p>\n","protected":false},"author":1,"featured_media":806,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/posts\/805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/comments?post=805"}],"version-history":[{"count":0,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/media\/806"}],"wp:attachment":[{"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/media?parent=805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/categories?post=805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuea.ac.ug\/blog\/wp-json\/wp\/v2\/tags?post=805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}