Report Incident
× Home Cybertech Africa 2023 2 DPO Rw-CSIRT Website About Rw-CSIRT Alerts Advisories About NCSA Documentation News & Events Topics Contact us Opportunities Privacy Policy

Cybersecurity Resolutions for 2026: Best practices for Youth, the Public and Organizations

As 2026 begins, technology is more integral to daily life than ever, yet online scammers are learning new tricks and cyber threats are growing more frequent and sophisticated.
 
While many new year resolutions involve fitness plans or learning a new skill, an equally vital habit to build this year is strengthening your online safety. Being proactive in ensuring strong digital hygiene - particularly in security - is the best way to outsmart scammers this year.
 
Whether you are a student, a professional, or an organization, here are some practical and actionable cybersecurity resolutions to help you stay secure online in 2026.
 
Youth and Students
 
1. Master Secure Access to your accounts
Use strong and complex passwords or a reputable password manager. Enable Multi-Factor Authentication (MFA) using an authenticator app. Biometric authentication is even better.
 
2. Think before you share
Limit personal information (school, location, birthday) on social media profiles. Assume anything posted is permanent and public.
 
3. Update without delay
Enable automatic updates on all devices (phones, laptops, gaming consoles) and apps. Do not ignore or postpone update notifications.
 
4. Spot and report phishing messages and emails
Learn the signs of phishing (urgency, poor grammar, mismatched sender addresses). Never click—report suspicious messages to a trusted adult or the platform.
 
5. Secure digital connections
Only connect to password-protected Wi-Fi. Use a VPN on public networks. Review app permissions (camera, mic, location) regularly and revoke unnecessary access.
 
6. Ignore promises of unearned rewards
Be cautious of people, platforms, or messages that promise quick success, money, status, or benefits you did not work for. Genuine progress usually requires effort, learning, patience, and consistency. Offers that sound too easy or guaranteed are often misleading, manipulative, or fraudulent. Train yourself to question how the reward is earned and what is required in return.
 
7. Avoid sharing misinformation
Before sharing any information, take a moment to verify its accuracy using reliable and credible sources. Spreading unverified or false information can cause confusion, harm others, and damage trust. If you are unsure whether something is true, it is better not to share it at all. Responsible communication helps create a more informed and trustworthy community.
 
Professionals & Everyday Users
 
1. Strengthen the security of your online accounts
Secure the security of your online accounts with strong multi-factor authentication, such as 2-step verification. This will add an extra layer of security to your online accounts and help you to reset passwords. For extra security, use biometric authentication, unique, strong passphrases (3-4 random words) or a password manager.
 
2. Monitor and protect financial accounts
Protect the sensitive information on credit and debit cards. Review statements monthly and set up transaction alerts for peace of mind.
 
3. Protect your home internet
Make sure that your internet router is not open for anyone to access it. Secure your home router by changing the default password and replacing it with a unique and strong password.
 
4. Backup important and sensitive family data
Automate backups of irreplaceable family data. Use the 3-2-1 rule: keep 3 copies of data (like family photos), on 2 different media (e.g., external drive + cloud), with 1 copy off-site. Test restores periodically.
 
Organizations
 
1. Create a security first culture
Ensure employees understand that security improves business it does not block it. Encourage reporting of suspicious activity without blame and provide engaging, regular training.
 
2. Implement awareness programs and training
Use engaging, simulated phishing exercises and role-based training to build a "human firewall.
 
3. Enforce a data backup policy
Mandate and test backups according to the 3-2-1 rule. Policy should require 3 copies of critical data, on 2 different media types, with 1 copy stored securely off-site. Regularly test backup integrity.
 
4. Develop your incident response plan
Have a tested, written plan that defines roles, communication channels, and legal steps. Conduct tabletop exercises at least annually.
 
5. Ensure compliance with Rwanda’s Personal Data Protection and Privacy Law
  1. Register with the Data Protection and Privacy Office (DPO)
  2. Appoint a Data Protection Officer
  3. Sign contracts with third parties for data processing
  4. Follow data protection principles
  5. Process data only with a lawful basis
  6. Keep records of data use
  7. Respect Data Subject rights
  8. Ensure agreements are in place for personal data transfers abroad
  9. Get approval from the DPO to store personal data outside Rwanda
  10. Ensure data security
  11. Report breaches on time to the DPO

16 January 2026

© 2026 National Cyber Security Authority