Language:
SEARCH

General

ServiceNow is ready to use

Friday, April 21st, 2017

Information Technology (IT) recently implemented ServiceNow, a new request and incident logging system for SU staff and students.

Our first step was to register all staff on the system. If you haven’t done this yet, please go to www.sun.ac.za/infoteg, click on Register for ServiceNow and log in. Once logged in, you are automatically registered.

ServiceNow is ready for you to use. We’d like to encourage you to use the Self Service function as much as possible to save you time and improve IT services. It can be used to:

1. log IT related incidents or requests,
2. track the progress of your requests,
3. get quotes on IT hardware and related items and
4. find IT related information.

FAQS

1. Who needs to register for ServiceNow?
All staff and students have to register if you want to use this powerful tool.
2. How do I register?
Follow the link and log in with your SU username and password.
3. How do I log an incident? Click here.
4. How do I log a request? Click here.
5. How do I track my incidents and requests? Click here.

If you still have questions after you’ve registered, please contact the IT Service Desk at 021 808 4367.

Wherever you roam, eduroam

Wednesday, April 5th, 2017

eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community.

Users can move between campuses and visit other participating institutions at home or abroad and get instant, secure network access, without having to arrange and use guest accounts or extra passwords. The visiting user is authenticated using the same credentials (username and password)  they use at their home institution, the institution or organisation they are affiliated with.

Visiting dignitaries who subscribe to eduroam will be able to connect to all wireless access points across campus.

More information on how to use and activate the eduroam service can be found in our service catalogue. Also consult the eduroam websites at www. eduroam.org and http://eduroam.ac.za.

Register for ServiceNow

Wednesday, April 5th, 2017

Information Technology (IT) will soon implement ServiceNow, a new request logging system for all SU staff and students. However, to register you need to follow a simple registration process. Please go to www.sun.ac.za/infoteg and click on the Register for ServiceNow button.

ServiceNow is a one-stop service to keep track of all your IT related requests. This multi-functional platform will enable us to streamline services for our clients, ensuring greater efficiency.

With ServiceNow, you or someone on your behalf, can submit your request online within seconds. You can log incidents, request IT services, search a knowledge base, and track progress on your requests. All these functions can be performed from any type of device, at any time, on a web-based IT self-service portal or Android or iPhone app.

Please take note that this process is only to register. After you logged in, you can close the web page again. We ask that you try not to log any requests, as we want to give everybody a chance to register before going live. When the registration process of users has been completed, we will notify you via e-mail and newsletter and you can start using the system.

If you have any questions, please contact the IT Service Desk at 021 808 4367 or help@sun.ac.za.

 

Alternative facts, fake news or lies?

Wednesday, March 1st, 2017

If there’s one thing the US election taught us, it’s that “alternative facts” exist and any news which puts Trump in a negative light is, apparently, “fake news”. Fake news does exist, but it’s not what Trump wants it to be.

“Fake news, or hoax news, refers to false information or propaganda published under the guise of being authentic news. Fake news websites and channels push their fake news content in an attempt to mislead consumers of the content and spread misinformation via social networks.” (http://www.webopedia.com/TERM/F/fake-news.html)

During the US election, it became clear that most of the fake news generated, including sites that improved Donald Trump’s chances as a candidate, originated from outside the United States. In Macedonia, one teenager started a lucrative business spreading the pro-Trump fake news. Whether this played any role in Trump’s presidential win, we’ll never know. Speaking of Trump – Did you hear he signed a visa-free travel policy for South Africa? Not true! Fake news! Sad! Even in South Africa, it was suggested that the ANC used fake news to try and influence the local elections. 

It’s easy to get swept up when you read something upsetting or ludicrous and of course, your first instinct is “I have to tell someone!” So you share it on Twitter, you send it via e-mail and you post it on Facebook and you feel like you are involved in spreading the news. And so something that’s not true spreads like wildfire and fake news peddlers are laughing all the way to the bank.

The increase of fake news means that we have to be more careful and even suspicious of what we read on the internet. If it looks like a news website, it doesn’t mean it is. On the contrary, it’s remarkably easy to create fake websites. There are ways to spot fake news, but it will require you to be more vigilant and above all, read more critically. Local (real) news website EWN lists a few tips to help you to distinguish between the real and the ridiculous. Mybroadband goes into even more detail with their article “How to stop falling for fake news on Facebook.”

Fake news characteristics are easily recognisable if you take the time to read the article before sharing it. By reading, you will notice details which don’t fit. If a headline sounds sensationalistic, it’s probably a fake article attempting to lure you into clicking.  Remember Google is your friend and can indicate whether the same news is shared by legitimate news sources or if this is the only one. It will also show if the article is an old one recycled to generate new clicks.

Avoid getting trapped in an echo chamber. We prefer to only read information and opinions we agree with and inevitably search engines only suggest similar articles with similar views. Try to read a bit wider – even articles covering topics that don’t necessarily interest you or you don’t agree with. Challenge your own viewpoints. 

 

More articles on fake news: 

We can’t talk about ‘fake news’ if we can’t agree what it means
Google and Facebook partner for anti-fake news drive during French election
Fake news website (Wikipedia)
List of fake news websites
List of satirical websites

 

[SOURCES: http://ewn.co.za; https://mybroadband.co.za/]

Learn What It Takes to Refuse the Phishing Bait!

Wednesday, February 1st, 2017

Cybercriminals know the best strategies for gaining access to your institution’s sensitive data. In most cases, it doesn’t involve them rappelling from a ceiling’s skylight and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate one staff member or student.

According to IBM’s 2014 Cyber Security Intelligence Index, human error is a factor in 95 percent of security incidents. Following are a few ways to identify various types of social engineering attacks and their telltale signs.

  • Phishing isn’t relegated to just e-mail! Cyber criminals will also launch phishing attacks through phone calls, text messages, or other online messaging applications. Don’t know the sender or caller? Seem too good to be true? It’s probably a phishing attack.
  • Know the signs. Does the e-mail contain a vague salutation, spelling or grammatical errors, an urgent request, and/or an offer that seems impossibly good? Click that delete button.
  • Verify the sender. Check the sender’s e-mail address to make sure it’s legitimate. If it appears that our help desk is asking you to click on a link to increase your mailbox quota, but the sender is “UniversityHelpDesk@yahoo.com,” it’s a phishing message.
  • Don’t be duped by aesthetics. Phishing e-mails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. However, if the message is urging you to take action — especially action such as sending sensitive information, clicking on a link, or downloading an attachment — exercise caution and look for other telltale signs of phishing attacks. Don’t hesitate to contact the company directly; they can verify legitimacy and may not even be aware that their name is being used for fraud.
  • Never, ever share your password. Did we say never? Yup, we mean never.Your password is the key to your identity, your data, and your classmates’ and colleagues’ data. It is for your eyes only. The IT department will never ask you for your password.
  • Avoid opening links and attachments from unknown senders. Get into the habit of typing known URLs into your browser. Don’t open attachments unless you’re expecting a file from someone. Give them a call if you’re suspicious.
  • When you’re not sure, call to verify. Let’s say you receive an e-mail claiming to be from someone you know — a friend, colleague, or even the rector of the university. Cyber criminals often spoof addresses to convince you, then request that you perform an action such as transfer funds or provide sensitive information. If something seems off about the e-mail, call them at a known number listed in the university’s directory to confirm the request.
  • Don’t talk to strangers! Receive a call from someone you don’t know? Are they asking you to provide information or making odd requests? Hang up the phone and report it to the helpdesk.
  • Don’t be tempted by abandoned flash drives. Cyber criminals may leave flash drives lying around for victims to pick up and insert, thereby unknowingly installing malware on their computers. You might be tempted to insert a flash drive only to find out the rightful owner, but be wary — it could be a trap.
  • See someone suspicious? Say something. If you notice someone suspicious walking around or “tailgating” someone else, especially in an off-limits area, call campus safety.

[ARTICLE FROM Educause]

 

© 2013-2017 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.