Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Protecting SU – Enhancing the cybersecurity landscape

Protecting SU PDF

At Stellenbosch University (SU), keeping our campus community, data and resources safe is a top priority for the IT Division. Over the past few years, we have been building stronger layers of security to protect you and the University from the growing threats in the digital world.  From cybersecurity awareness training to advanced threat protection, secure device management and real-time monitoring, each step has been part of a broader effort to strengthen the protection of our information and communication landscape. This timeline reflects our commitment to enhancing the cybersecurity landscape at SU without disrupting the daily work of SU staff and students or invading their privacy.   

Building cybersecurity awareness with UCISA training 

As part of our ongoing efforts to protect SU from cyber threats, the UCISA Information Security Awareness training for staff and students was introduced. UCISA (Universities and Colleges Information Systems Association) is a UK-based organisation that develops cybersecurity training tailored for higher education institutions. The course covers essential topics such as an introduction to cybersecurity, recognising phishing and scams, safe information management, password and access control, protecting devices and responsible use of privileged access. This training complements our technical defences by building human awareness.  

If you have not already completed the training, we encourage you to do so – it is quick, informative and helps keep the University safer. You will find it on SUNLearn under My courses via this link: https://learn.sun.ac.za/course/view.php?id=32398  

 

Stopping threats before they reach your inbox with Defender

We also began addressing the most common way threats reach us – through email. By introducing advanced anti-spam, anti-malware and anti-phishing measures, we significantly reduced the number of malicious messages reaching inboxes. Some of the most powerful protections were made possible through Microsoft Defender for Office 365, which allows us to apply enhanced anti-phishing policies that go beyond standard email filtering, as illustrated in the image below: 

 

Managing and protecting SU devices with Microsoft Intune 

Next, we rolled out Microsoft Intune, a cloud-based endpoint management solution that securely manages University-owned identities, apps and devices such as laptops, desktops and tablets. It ensures that only trusted, compliant devices can access tools like Outlook and OneDrive. Intune plays a key role in strengthening cybersecurity without disrupting daily digital activities. Nearly 7200 university-owned devices are managed and protected with Microsoft Intune, reducing risks from outdated software and unsecure devices. 

 

Ongoing protection with Sentinel 

Microsoft Sentinel was deployed for continuous monitoring of SU’s networks and systems. Sentinel helps the IT team respond to thousands of security alerts every month, ensuring threats are detected and contained quickly to protect our campus. Just in April and May alone this year, almost 12 000 incidents were reported. 

 

Continuous security with MXDR 

We have recently advanced our security measures with the implementation of Managed Extended Detection and Response (MXDR). MXDR is a proactive cybersecurity service that helps detect, investigate and respond to potential threats across our IT systems. Furthermore, advanced technology experts monitor to identify and prevent cyber threats before they can cause harm to protect your data and the University’s information systems. If malware, ransomware or other suspicious activity is detected, MXDR acts to limit impact and protect our systems and data. 

 What MXDR does: 

  • Monitor for signs of cyber threats 
  • Detect, analyse and contain attacks before the user is aware or system is impacted 
  • Helps to maintain a safe and secure digital environment for all 
  • Minimise the downtime and data loss if a cyber-attack takes place 

 What MXDR does not do: 

  • Access personal communication or content 
  • Collect or share personal information beyond what is necessary as a security measure 
  • Monitor privately owned devices (except where explicit permission was provided by the user for SU IT to onboard the device) 

A visual summary of all the monitored surfaces – any part of the University’s digital environment that is actively observed and analysed for potential threats, vulnerabilities or suspicious behaviour (including endpoint devices) – is available below: 

FAQs

Can SU IT monitor my private device if I installed Microsoft 365 on it? 

No, only endpoint devices such as laptops, desktops and tablets that are on the University asset register are monitored. 

Can MXDR access my personal (confidential) files, browsing history or private communications on a university-owned device? 

No, MXDR is a protective measure, not a surveillance service, and it assists in protecting data whilst mitigating cyber threats. 

What about my privacy? Does MXDR collect personal or confidential data? 

No, MXDR is fully aligned with the University’s data protection policies and South African privacy regulations such as POPIA. 

 

Ongoing commitment  

Keeping the University safe from growing digital threats is not a once-off project – it is a continuous effort. The IT Division will continue to share more updates on developments as we continue to protect  SU’s digital landscape. 

 *An Afrikaans version of this blog will be made available soon. 

Leave a Reply

*

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.