%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 12 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250712181118+00'00') /ModDate (D:20250712181118+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 5576 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 73.757 521.469 672.977 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 73.757 l 565.984 73.757 l 565.984 745.984 l f 45.266 746.734 m 45.266 73.757 l 46.016 73.757 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(PHISHING SCAM DISGUISED AS AN OUTSURANCE R400 PREMIUM )] TJ ET BT 61.016 676.134 Td /F1 14.4 Tf [(CLAIM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 647.326 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 647.326 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 647.326 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 647.326 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 619.837 Td /F4 9.0 Tf [(This week a phishing scam is in the disguise of an alleged payout by Outsurance of a R400 premium, is circulating. Now if )] TJ ET BT 61.016 608.848 Td /F4 9.0 Tf [(you are an Outsurance member, then this scam can fool you, but there are a number of telltale points that will reveal this )] TJ ET BT 61.016 597.859 Td /F4 9.0 Tf [(mail to be a scam:)] TJ ET BT 78.360 577.886 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 577.870 Td /F4 9.0 Tf [(So-called branding \(with an Outsurance Logo and a Sender that looks like it comes from Outsurance\) are easily )] TJ ET BT 91.016 566.881 Td /F4 9.0 Tf [(counterfeited.)] TJ ET BT 78.360 555.908 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 555.892 Td /F4 9.0 Tf [(Outsurance has most of your details if you are a client and the salutation will always be your name and never just )] TJ ET BT 91.016 544.903 Td /F4 9.0 Tf [("Dear Client".)] TJ ET BT 78.360 533.930 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 533.914 Td /F4 9.0 Tf [(Outsurance does not use Dropbox to deliver ANY documents. They will always use their own systems and usually )] TJ ET BT 91.016 522.925 Td /F4 9.0 Tf [(send PDF documents after informing you via e-mail AFTER calling you personally and confirming some personal )] TJ ET BT 91.016 511.936 Td /F4 9.0 Tf [(details.)] TJ ET BT 78.360 500.963 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 500.947 Td /F4 9.0 Tf [(Outsurance will have a registered contact e-mail address on their system, but they will never ask for your e-mail )] TJ ET BT 91.016 489.958 Td /F4 9.0 Tf [(password. Hopefully, you do not use your University of Stellenbosch e-mail address for as your personal contact )] TJ ET BT 91.016 478.969 Td /F4 9.0 Tf [(address.)] TJ ET BT 78.360 467.996 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 467.980 Td /F4 9.0 Tf [(This e-mail's grammar is terrible. It is very unprofessional and the use of threats such as "PAYOUT will be denied if )] TJ ET BT 91.016 456.991 Td /F4 9.0 Tf [(details are inconsistent/wrong" is usually a typical tactic of phishers.)] TJ ET BT 78.360 446.018 Td /F4 9.0 Tf [(6.)] TJ ET BT 91.016 446.002 Td /F4 9.0 Tf [(Scammers are wanting personal details and your signature. Why? So they can use it to gain access to your other )] TJ ET BT 91.016 435.013 Td /F4 9.0 Tf [(accounts that have money, like bank accounts, or use your signature \(that you sent them\) to sign forged cheques )] TJ ET BT 91.016 424.024 Td /F4 9.0 Tf [(etc.)] TJ ET BT 61.016 404.035 Td /F4 9.0 Tf [(Standard Bank South Africa recently lost R300 million in ATM fraud in Japan this week. The criminals used forged credit )] TJ ET BT 61.016 393.046 Td /F4 9.0 Tf [(cards. No doubt the details on those cards were obtained using names and details that they obtained from phishing scams )] TJ ET BT 61.016 382.057 Td /F4 9.0 Tf [(such as this Outsurance scam. Crime syndicates often exchange and share data they obtain amongst their fellow )] TJ ET BT 61.016 371.068 Td /F4 9.0 Tf [(syndicates and use it to commit fraud.)] TJ ET BT 61.016 351.079 Td /F4 9.0 Tf [(Here is an example of the Outsurance scam mail that is circulating at the moment. We removed the "DropBox" link and )] TJ ET BT 61.016 340.090 Td /F4 9.0 Tf [(the attached file for your safety.)] TJ ET BT 61.016 320.101 Td /F4 9.0 Tf [(~~~)] TJ ET BT 61.016 289.312 Td /F4 9.0 Tf [(From: OUTsurance [mailto:premium@OUTsurance.co.za] )] TJ ET BT 61.016 278.323 Td /F4 9.0 Tf [(Sent: 24 May 2016 08:45 AM)] TJ ET BT 61.016 267.334 Td /F4 9.0 Tf [(To: Recipients )] TJ ET BT 61.016 256.345 Td /F4 9.0 Tf [(Subject: Claim your Outsurance R400 premium)] TJ ET BT 61.016 236.356 Td /F4 9.0 Tf [(Dear Client,)] TJ ET BT 61.016 216.367 Td /F4 9.0 Tf [(Your monthly R400 premium PAYOUT is ready. Please log in to our DropBox document file with correct Email address )] TJ ET BT 61.016 205.378 Td /F4 9.0 Tf [(and Email Password registered with us to confirm details. PAYOUT will be denied if details are inconsistent/wrong. )] TJ ET BT 61.016 194.389 Td /F4 9.0 Tf [(Download, print and sign the forms, attach and email back to us for payment to be effected.)] TJ ET BT 61.016 174.400 Td /F4 9.0 Tf [(OUTsurance premium PAYOUT)] TJ ET 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 61.016 173.249 m 189.041 173.249 l S BT 61.016 154.411 Td /F4 9.0 Tf [(Thank you.)] TJ ET BT 61.016 134.422 Td /F4 9.0 Tf [( 2015 OUTsurance Insurance Company Limited and OUTsurance Life Insurance Company Limited A Member of the )] TJ ET BT 61.016 123.433 Td /F4 9.0 Tf [(Rand Merchant Insurance Holdings \(RMI\) Group and an Authorised Financial Services Provider FSP \(896\))] TJ ET BT 61.016 103.444 Td /F4 9.0 Tf [()] TJ ET BT 432.949 83.455 Td /F4 9.0 Tf [([ARTICLE BY DAVID WILES])] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Page /Parent 3 0 R /Contents 13 0 R >> endobj 13 0 obj << /Length 618 >> stream 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 719.245 521.469 38.739 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 719.245 m 566.734 719.245 l 565.984 719.995 l 46.016 719.995 l f 566.734 757.984 m 566.734 719.245 l 565.984 719.995 l 565.984 757.984 l f 45.266 757.984 m 45.266 719.245 l 46.016 719.995 l 46.016 757.984 l f 61.016 734.995 m 550.984 734.995 l 550.984 735.745 l 61.016 735.745 l f 0.400 0.400 0.400 rg BT 61.016 749.193 Td /F2 9.0 Tf [(Posted in:E-mail,Security | | With 0 comments)] TJ ET endstream endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000542 00000 n 0000006170 00000 n 0000006282 00000 n 0000006397 00000 n 0000006517 00000 n 0000006625 00000 n 0000006690 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 7360 %%EOF May « 2016 « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

May, 2016

New login method for sun-e-HR

Friday, May 27th, 2016

Please note that, as part of Information Technology Division’s renewal process, the sun-e-HR system will obtain a new login method. For any user of the sun-e-HR-system, this means that the login screen will change (screenprint below).

The sun-e-HR system will continue to be synchronised with your login credentials for Stellenbosch University. This means that you need to log in with your Stellenbosch University username and password.

Further to the above change, the sun-e-HR-system will also obtain a new web address, but can still be accessed via the My.SUN web page (http://my.sun.ac.za/)

As a result of the above changes, the sun-e-HR system will not be available from 27 May 2016 at 17:00 to 30 May 2016 at 08:00.

Should you experience any problems with your login credentials from 30 May 2016, please call the IT Helpdesk, at 021 808 4367 or help@sun.ac.za.

We apologise for any inconvenience.

Information Technology and Human Resources

mhb

 

Institutional software solutions

Thursday, May 26th, 2016

MISSION STATEMENT | MANAGERS

MISSION STATEMENT

Information is crucial and strategic for a knowledge-intensive and knowledge-producing enterprise such as a university to thrive. Institutional software solutions [1]  form the basis of all institutional information systems and are fundamental in the majority of institutional processes.

The ISS Section:

Builds, provides, maintains and supports reliable, innovative and sustainable institutional software solutions that meet the University’s needs timeously and over the long term.

In order to fulfill the above mission, the ISS Section performs the following functions:

  • Manages relationships with solution and system owners (clients), external and internal IT partners, stakeholders, communities, and vendors;
  • Performs business analysis in order to understand and help refine institutional processes, and determine requirements;
  • Develops software, which includes designing and coding solutions with the long-term in mind, and establishing and maintaining the necessary software development environment, skills and knowledge;
  • Maintains the software application portfolio  over the long term;
  • Integrates (connects) software applications and systems in order to orchestrate institutional processes, enable integrated reporting and integrated views of institutional information;
  • Sources software solutions by helping clients and partners to select solutions, and by brokering solutions i.e. facilitating the procurement of solutions;
  • Supports software solutions by monitoring operations, configuring systems, managing incidents and problems, and helping clients and partners to train endusers;
  • Architects data, software solutions, business processes (in collaboration with functional partners) and integrations in collaboration with the IT Architecture Function.
  • Manages software solution development and implementation projects.

[1] University-owned or managed software applications (or solutions) that have a broad application across the institution, as opposed to specialised value for a single or few organisational entities within the university. The definition includes software such as web content management systems and mobile apps, amongst others. By way of example, a laboratory information system that has specialised value for only a single academic department or a single faculty would likely not be classed as an institutional software solution.

MANAGERS

daneel

DANEEL VAN WIJCK | Manager: IT Financial and Facilities Information Systems

Daneel is responsible for the management, procurement, development, and support of the portfolio of information systems and software solutions that meets the needs of, and enables, the Finance and Facilities Management functions. Included in the role is the maintenance of relationships with these functional partners and principal users. As such, Daneel is the single point of contact at IT for these divisions.

ANNA-MARI DU TOIT | Manager: IT Student Information Systems

Anna-Mari is responsible for the management, procurement, development and support of the porfolio of information systems and software solutions that meets the needs of, and enables, professional and service divisions that administer the student lifecycle from prospective students to alumni. Included in the role is the maintenance of relationships with these functional partners and principal users. As such, Anna-Mari is the single point of contact at IT for these divisions.

benette BENETTE BRINK | Manager: IT Business Analysis

Benette is responsible for managing and developing the Business Analysis practice and capability in ISS. Business Analysis promotes the application of information and communications technology (ICT) to solve the institution’s business problems; facilitates transformation in operating, administrative and academic processes by applying ICT appropriately; interprets business needs for the technologists and technology for administrators, managers, and academics. Benette leads and maintains a team of skilled business analysts. She also manages relationships with selected partner and client divisions.

marc-allen

MARC-ALLEN JOHNSON | Manager: IT Software Development

Marc-Allen is responsible for managing and developing the Software Development practice and capability in ISS. He leads a team of programmers and designers that develop and integrate institutional software solutions. Marc-Allen is also responsible for providing and coordinating integration and software application architecture guidance and advice to the IT Architecture Function.

 

BERNARD HEESEN | Head: ISS Configuration and Support

Bernard is responsible for configuring generic software platforms, such as Sharepoint and other content management systems, Dynamix CRM and Office365 to create institutional solutions, and supporting them. He leads a team of software specialists who are trained to exploit these platforms. Bernard also manages relationships with selected partner and client divisions.

 

PAUL ROOS | Head: IT Management Information Systems

Paul is responsible for the management, procurement, development and support of the data warehouses and data analytics systems and services that underpin institutional analytics, management information and operational reporting systems such as SUN-i and SUNRep. As such he manages the IT relationship with the Institutional Research and Planning Division. Paul is also responsible for providing and coordinating data architecture guidance and advice to the IT Architecture Function.

MALANIE ORTMANN | Head: Human Resources Information Systems

Malanie is responsible for the management, procurement, development, and support of the portfolio of information systems and software solutions that meet the needs of and enables, the HR Division. Included in the role is the maintenance of relationships with this functional partner and its principal user. As such, Malanie is the single point of contact at IT for the HR Division. Malanie also coordinates the Incident and Problem Management process within ISS.

 

Are you an aspiring scientist?

Wednesday, May 25th, 2016

sciencejournalGoogle just released an app which might appeal to budding scientists.  It’s called Science Journal, and measures and records data in real-time by using the sensors embedded in Android phones. 

The Science Journal app allows you to gather data from the world around you. By using the phone’s sensors, it measures elements in your environment, like light and sound, so you can graph data, record experiments, and organise questions and ideas.

If your main aim is to take over the world, instead of conducting small experiments for your own amusement, this might not be your cup of tea. Its main objective is to get children involved and interested in science, but it can still be fun for the adult who still wants to play.

The app is part of a larger Google initiative called The Making & Science Initiative which believes anyone can be a scientist by observing your everyday life, figuring out how things work and creating projects to improve the world.

Science Journal also allows you to make notes about your experiments and keep a digital journal – just in case you make that breakthrough discovery and forgot how it happened.

It is available as a free download from the Google Play Store and needs a smartphone running on Android 4.4 KitKat to install the 14MB app. 

Read more on Google’s latest projects, including a modular cellphone and an attempt at smart clothes.

So did you also get an e-mail from Pravin Gordhan?

Wednesday, May 25th, 2016

Every day, countless phishing emails are sent to us at Tygerberg Campus and to the Main Campus. This one (see below) is so outlandish that it is an obvious fraud, but others can be a bit more convincing. Using this as an example, there are a number of things that you can look for.

Here are 10 of them:

1: The message contains a mismatched URL: If the hyperlinked address is different from the address that is displayed, the message is probably fraudulent or malicious.

2: URLs contain a misleading domain name: Phishers try to convince their victims that a message came from the government or a company like Microsoft or Apple.

3: The message contains poor spelling and grammar: Reading this mail I attach as an example should leave no doubt.

4: The message asks for personal information: No matter how official an email message might look, it’s always a bad sign if the message asks for personal information. Your bank doesn’t need you to send your account number, neither does the government.

5: The offer seems too good to be true: If you receive a message from someone unknown to you who is making big promises, the message is probably a scam.

6: You didn’t initiate the action: If you get a message informing you that you have won a contest you did not enter, you can bet that the message is a scam.

7: You’re asked to send money to cover expenses: One telltale sign of a phishing email is that you will eventually be asked for money or provide data to release the money.

8: The message makes unrealistic threats: Here the “minister” says if you don’t respond the government will take the money. (That should bring a smile to your face!)

9: The message appears to be from a government agency: Phishing artists who want to use intimidation don’t always pose as a bank. Sometimes they’ll send messages claiming to have come from a government agency or SARS.

10: Something just doesn’t look right: Professionals in the security business are taught to look for anything that is “JDLR” – (Just Doesn’t Look Right)  If you receive a message that seems suspicious, it’s usually in your best interest to avoid acting on the message.

[ARTICLE BY DAVID WILES]

 

 


 

From: Pravin Gordhan [mailto:praving@treasury.gov.za]
Sent: Tuesday, 24 May 2016 14:36
Subject: FOR YOUR URGENT ATTENTION-FROM THE OFFICE OF HONORABLE MINISTER OF FINANCE.

Attention,

I write in respect of a fund brought to the department of National Treasury earlier today from Reserve bank under your name.

From the reports contained in the file having your information attached to the fund, the fund was supposed to be transferred to you from Reserve bank, but was not due to some reasons that were not mentioned in the file.

The fund is 9.5m USD. Are you aware of the fund?

This notification stands as the first and final notice to you for you to claim your fund and after 5 working days of this notification, if I do not hear from you, I will have no option than to declare the fund government’s fund.

Please re-confirm the following details;

1, Your full name and address.

2, Your age and occupation.

3, Your cell phone number.

Revert back to me as soon as get this email, so that we can process the release your fund to you.

Yours Sincerely.
Pravin Gordhan
Honorable Minister of Finance,
Republic of South Africa.

Phishing scam disguised as an Outsurance R400 premium claim

Wednesday, May 25th, 2016

This week a phishing scam is in the disguise of an alleged payout by Outsurance of a R400 premium, is circulating. Now if you are an Outsurance member, then this scam can fool you, but there are a number of telltale points that will reveal this mail to be a scam:

  1. So-called branding (with an Outsurance Logo and a Sender that looks like it comes from Outsurance) are easily counterfeited.
  2. Outsurance has most of your details if you are a client and the salutation will always be your name and never just “Dear Client”.
  3. Outsurance does not use Dropbox to deliver ANY documents. They will always use their own systems and usually send PDF documents after informing you via e-mail AFTER calling you personally and confirming some personal details.
  4. Outsurance will have a registered contact e-mail address on their system, but they will never ask for your e-mail password. Hopefully, you do not use your University of Stellenbosch e-mail address for as your personal contact address.
  5. This e-mail’s grammar is terrible. It is very unprofessional and the use of threats such as “PAYOUT will be denied if details are inconsistent/wrong” is usually a typical tactic of phishers.
  6. Scammers are wanting personal details and your signature. Why? So they can use it to gain access to your other accounts that have money, like bank accounts, or use your signature (that you sent them) to sign forged cheques etc.

Standard Bank South Africa recently lost R300 million in ATM fraud in Japan this week. The criminals used forged credit cards. No doubt the details on those cards were obtained using names and details that they obtained from phishing scams such as this Outsurance scam. Crime syndicates often exchange and share data they obtain amongst their fellow syndicates and use it to commit fraud.

Here is an example of the Outsurance scam mail that is circulating at the moment. We removed the “DropBox” link and the attached file for your safety. 

~~~

From: OUTsurance [mailto:premium@OUTsurance.co.za]
Sent: 24 May 2016 08:45 AM
To: Recipients <premium@OUTsurance.co.za>
Subject: Claim your Outsurance R400 premium

Dear Client,

Your monthly R400 premium PAYOUT is ready. Please log in to our DropBox document file with correct Email address and Email Password registered with us to confirm details. PAYOUT will be denied if details are inconsistent/wrong. Download, print and sign the forms, attach and email back to us for payment to be effected.

OUTsurance premium PAYOUT

Thank you.

© 2015 OUTsurance Insurance Company Limited and OUTsurance Life Insurance Company Limited A Member of the Rand Merchant Insurance Holdings (RMI) Group and an Authorised Financial Services Provider FSP (896)

 

[ARTICLE BY DAVID WILES]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.