%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519005431+00'00') /ModDate (D:20240519005431+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 4993 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 304.783 521.469 441.951 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 305.158 520.719 441.201 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(BE CYBERAWARE DURING THE HOLIDAY PERIOD)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(The time has come for everyone to take a well-deserved break and spend time with friends and family. From 22 December )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(at 12:00 until 1 January Information Technology offices will be closed and no user support will be provided.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(However, just because we're on holiday it doesn't mean fraudsters, opportunists and cybercriminals will also take a break. )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(On the contrary, this is the ideal time for them to scam you out of your hard-earned money.)] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(We'd like to remind you to be especially vigilant over the holiday season by following these guidelines when receiving )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(emails or conducting online transactions:)] TJ ET 0.400 0.400 0.400 RG 85.866 473.915 m 85.866 474.328 85.696 474.737 85.404 475.029 c 85.113 475.321 84.703 475.490 84.291 475.490 c 83.878 475.490 83.469 475.321 83.177 475.029 c 82.885 474.737 82.716 474.328 82.716 473.915 c 82.716 473.503 82.885 473.093 83.177 472.802 c 83.469 472.510 83.878 472.340 84.291 472.340 c 84.703 472.340 85.113 472.510 85.404 472.802 c 85.696 473.093 85.866 473.503 85.866 473.915 c f BT 91.016 471.099 Td /F3 9.0 Tf [(We will never ask for your username and password. Don't divulge your username and/or password if being asked )] TJ ET BT 91.016 460.110 Td /F3 9.0 Tf [(via email. By doing this, you are giving someone access to all your confidential SU information, including salary )] TJ ET BT 91.016 449.121 Td /F3 9.0 Tf [(details.)] TJ ET 85.866 440.948 m 85.866 441.361 85.696 441.770 85.404 442.062 c 85.113 442.354 84.703 442.523 84.291 442.523 c 83.878 442.523 83.469 442.354 83.177 442.062 c 82.885 441.770 82.716 441.361 82.716 440.948 c 82.716 440.536 82.885 440.126 83.177 439.835 c 83.469 439.543 83.878 439.373 84.291 439.373 c 84.703 439.373 85.113 439.543 85.404 439.835 c 85.696 440.126 85.866 440.536 85.866 440.948 c f BT 91.016 438.132 Td /F3 9.0 Tf [(Do not click on any attachments, even if the address is a sun email address. If you are unsure, contact the person )] TJ ET BT 91.016 427.143 Td /F3 9.0 Tf [(first to confirm.)] TJ ET 85.866 418.970 m 85.866 419.383 85.696 419.792 85.404 420.084 c 85.113 420.376 84.703 420.545 84.291 420.545 c 83.878 420.545 83.469 420.376 83.177 420.084 c 82.885 419.792 82.716 419.383 82.716 418.970 c 82.716 418.558 82.885 418.148 83.177 417.857 c 83.469 417.565 83.878 417.395 84.291 417.395 c 84.703 417.395 85.113 417.565 85.404 417.857 c 85.696 418.148 85.866 418.558 85.866 418.970 c f BT 91.016 416.154 Td /F3 9.0 Tf [(Do not click on a website address given in an email. Rather go to your browser and type the correct address in the )] TJ ET BT 91.016 405.165 Td /F3 9.0 Tf [(address bar.)] TJ ET 85.866 396.992 m 85.866 397.405 85.696 397.814 85.404 398.106 c 85.113 398.398 84.703 398.567 84.291 398.567 c 83.878 398.567 83.469 398.398 83.177 398.106 c 82.885 397.814 82.716 397.405 82.716 396.992 c 82.716 396.580 82.885 396.170 83.177 395.879 c 83.469 395.587 83.878 395.417 84.291 395.417 c 84.703 395.417 85.113 395.587 85.404 395.879 c 85.696 396.170 85.866 396.580 85.866 396.992 c f BT 91.016 394.176 Td /F3 9.0 Tf [(Never conduct any transactions on a public, unprotected WiFi connection.)] TJ ET 85.866 386.003 m 85.866 386.416 85.696 386.825 85.404 387.117 c 85.113 387.409 84.703 387.578 84.291 387.578 c 83.878 387.578 83.469 387.409 83.177 387.117 c 82.885 386.825 82.716 386.416 82.716 386.003 c 82.716 385.591 82.885 385.181 83.177 384.890 c 83.469 384.598 83.878 384.428 84.291 384.428 c 84.703 384.428 85.113 384.598 85.404 384.890 c 85.696 385.181 85.866 385.591 85.866 386.003 c f BT 91.016 383.187 Td /F3 9.0 Tf [(If you are unsure of the legitimacy of an email, contact the institution or person it was sent from directly by phone )] TJ ET BT 91.016 372.198 Td /F3 9.0 Tf [(to confirm.)] TJ ET BT 61.016 352.209 Td /F3 9.0 Tf [(For further assistance email help@sun.ac.za or call our Service Desk at 808 4367. More information on cybersecurity can )] TJ ET BT 61.016 341.220 Td /F3 9.0 Tf [(be found on our blog and Twitter account.)] TJ ET BT 61.016 322.731 Td /F3 9.0 Tf [(Posted in:E-mail,Phishing,Security | Tagged:Cybersecurity,Phishing | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj xref 0 11 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000294 00000 n 0000000323 00000 n 0000000458 00000 n 0000000521 00000 n 0000005566 00000 n 0000005678 00000 n 0000005785 00000 n trailer << /Size 11 /Root 1 0 R /Info 5 0 R >> startxref 5901 %%EOF cybersecurity « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

cybersecurity

Cybersecurity Awareness Month: Creating strong passwords

Tuesday, October 5th, 2021

Before we pointed out that most people underestimate the importance of having a secure password, and still make the mistake of using simple words and numbers as a password.

Keep in mind that your email and social network accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

  • Using email or your profile on Facebook, Whatsapp or Google, hackers can and do, extract a huge amount of personal data of your personal “online” life.
  • If you use the same password for multiple online accounts, you run the risk, if this password is hacked, of all your online accounts being compromised.
  • Using a personal name for an online account, the name of the city that you live in, the names of your children or your date of birth, give hackers vital clues for attempting to access your personal data.
  • For an average expert hacker, it is always easy to find passwords that are made up of words from the English vocabulary or other languages, using a basic technique called “brute force” or “dictionary” attacks.

What makes a password safe?

  1. A password at least 8 characters long.
  2. The password does not contain information that is easy to find online, such as the date of birth, the telephone number, your spouse’s name, the name of a pet, or a child’s name.
  3. The password does not contain words found in the dictionary.
  4. The password contains special characters like @ # $% ^ &, and numbers.
  5. The password uses a combination of uppercase and lowercase letters.

A trick that the experts use to create secure passwords:

Think of a phrase and use the first letters of the words in the phrase.

  • For example: “In South Africa, a barbecue is called a Braai!”
  • Take the first letters of each word and the password that is created is ISAabicaB!
  • This will be very difficult to guess, but easy to remember.
  • At this point, you can decide to make your the Google password is ISAabicaB!-G,  and Facebook ISAabicaB!-F and your university account  ISAabicaB!-US and so on.
  • There is already a capital letter and a special character (!), so you just need to add a number to finish off a good password like 9-ISAabicaB!-US (9 could be the month you created the password in – for example)

You will have already made your password a lot more difficult to hack, and it can be a lot of fun to create. 

Be cyberaware during the holiday period

Wednesday, December 20th, 2017

The time has come for everyone to take a well-deserved break and spend time with friends and family. From 22 December at 12:00 until 1 January Information Technology offices will be closed and no user support will be provided.

However, just because we’re on holiday it doesn’t mean fraudsters, opportunists and cybercriminals will also take a break. On the contrary, this is the ideal time for them to scam you out of your hard-earned money.

We’d like to remind you to be especially vigilant over the holiday season by following these guidelines when receiving emails or conducting online transactions:

  • We will never ask for your username and password. Don’t divulge your username and/or password if being asked via email. By doing this, you are giving someone access to all your confidential SU information, including salary details.
  • Do not click on any attachments, even if the address is a sun email address. If you are unsure, contact the person first to confirm.
  • Do not click on a website address given in an email. Rather go to your browser and type the correct address in the address bar.
  • Never conduct any transactions on a public, unprotected WiFi connection.
  • If you are unsure of the legitimacy of an email, contact the institution or person it was sent from directly by phone to confirm.

For further assistance email help@sun.ac.za or call our Service Desk at 808 4367. More information on cybersecurity can be found on our blog and Twitter account.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.