Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Communication

Your conference – unplugged

Friday, June 7th, 2013

As the trend to use your own, personal devices within the university environment increases, so does the need and expectation to have access to the internet at all times and wherever you are.

This is also the case when it comes to conferences and other academic events on campus. But how do you go about to make life easier for your and your conference attendees?

To apply for wireless access for your conference or event, just follow these simple instructions.

E-mail help@sun.ac.za with the following information*
 
Name of conference/visitor
Location of conference (building, room)
Start date and time
End date and time
Interdepartmental requisition (OE 6414​ for the amount of R300-00 per day)
Contact person
 

* E-mail has to be sent 14 days prior to the conference or arrival of visitor to ensure that there are existing WAPs (wireless access points ) at the location)

 

As soon as the request is received and after the SSID –  “service set identifier,” (username and password) is created, you will be notified by e-mail or telephonically.  When conference goers or visitors are inside the WIFI area, their equipment will pick up the WIFI  and they will be able to connect.

To blog or not to blog?

Friday, May 24th, 2013

Over the past fifteen years the word “blog” has become part of our daily vocabulary and most of us visit some form of blog on a daily basis. In some cases we’re not even aware of the fact that it’s a blog. Since the emergence of blogs in the late 1990’s their appearance and functions changed and developed.

A Blog (combination of the words “web” and “log”) is a website that contains stories and updates in reverse chronological order–the most recent entries appear at the top of the front page, and you browse backwards to move through the past articles.

A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Through the sharing of information the blogger builds a relationship with his readers or followers and a virtual community of like minded people with similar interests is cultivated.

The emergence of blogs changed the face &  future of journalism to a large extent. Suddenly anyone with access to a pc, was able to publish their opinions and writings. Most blogging platforms are extremely user friendly and makes it easy for individuals without web design experience to have their blog at no cost whatsoever.

Initially blogs were about personal experiences and maintained by a single person as a form of self expression or commentary on certain topics. These blogs were initially made possible by sites like Open Diary, Live Journal and Blogger. By the late 2000’s the focus shifted from blogs as personal diaries to full blown, edited and moderated digital magazines. “Multi-author blogs” started developing, with posts written by large numbers of authors and professionally edited.

As the purpose of blogs shifted through the years, so did their format. Now we also have a scaled down version of the original blog format, the microblog.  Microblogs consist of short commentaries or content, and photos, videos or other multimedia. Twitter and Tumblr are two of the more popular examples of microblogging and are especially useful when it comes to realtime updates of important global events.

If you’re feeling inspired and would like to create a blog for your department, you don’t have to look far. You can host your department’s blog locally on the university’s own WordPress platform. For more information, click here.

[SOURCE: www.howtogeek.com & www.wikipedia.org]

 

 

 

Beware of SIM card swap fraud

Friday, February 22nd, 2013

 

Although it is a known scam, when it hits one of your colleagues, it makes you aware that there are very real dangers out there. A SIM card swap fraud occurs when criminals obtain and utilise a replacement SIM card to acquire security messages and one-time passwords (OTP) sent to you by the bank. Using the OTP, criminals are able to change, add beneficiaries and transfer money out of your account using your personal information that they would have obtained through phishing. One of our colleagues lost R20 000 over the holidays and asked us to warn other staff as well:

How does a SIM swap scam work?

  • The SIM swap takes place after the fraudsters have received a your bank logon details as a result of the you responding to, for example, a Phishing e-mail. (this is why phishing e-mails are so dangerous and you should never ever respond or click on links contained in these phishing e-mails.)
  • Once the fraudsters have the your cell phone number and other personal information, the fraudster can pose as you, requesting a new SIM card from a cellular service provider.
  • The cellular service provider transfers the your SIM card identity to the new SIM card, cancelling your old SIM card in the process.
  • The result is that there is no signal on the old SIM card, which means the you cannot receive / make phone calls or send SMS messages. (This ought to be the first sign of something wrong, so if you get  “SIMCARD INVALID” error on your cell phone)
  • The SMS authorisation reference number, which is normally sent to the client, reaches the fraudster instead of you, the legitimate owner, and the fraudster is able to make once-off payments and create beneficiaries fraudulently

What should I do if I suspect an unlawful SIM swap?

  • If you fall prey to an unlawful SIM swap, or suspect that you have, contact your cellular service provider for assistance.
  • Also contact the internet banking helpdesk to request that your internet banking access be suspended with immediate effect. This will prevent fraudsters from gaining access and transacting on your accounts.

What can I do to prevent SIM swap fraud?

  • Protect your information – all your information.
  • Do not disclose your ID number on websites unless you have verified the legitimacy of the site. The bank already knows your ID number and will not require you to give it to us again.
  • Do not disclose your cell number on websites unless you have verified the legitimacy of the site. Phishing sites often request for information such as ID Number, email address and email address password, physical address, etc.
  • Always make sure that your contact details on Internet banking are valid and correct. You know when your details have changed, so when you are ready, you can update the information on Internet banking or at a local bank branch.

[INFORMATION SUPPLIED BY DAVID WILES]

 

Keep your cell phone secure

Friday, February 22nd, 2013

These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work information on your device and it’s always connected to the internet.

It’s exactly this convenience that puts you as a smartphone user at risk. Cooltech, iAfrica’s tech section, has a few ideas to minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and other security risks.

Set up a password

Your first line of defense is to simply set up a password on your phone. Most cellphone providers allow you to type in a pin number each time you switch on your phone or after a period on inactivity.

Install security software

Since smart phones are no longer just for storing phone numbers and sms’s, but also bankdetails, they’re also an easy and perfect target for cybercriminals.

Consider installing anti virus software to protect your device against malware. F-Secure, Norton and other large security software vendors each have their own version for the main smartphone platforms.

Activate the remote wipe function

The biggest risk is the the theft or loss of your device. Rather than worry about a stranger snooping through your information, activate the remore wipe function.

This function will allow you, by means of an internet connection, to delete your photos, business contacts and e-mails when you suspect you might not be able to recover your phone.

Some manufacturers like BlackBerry and Apple offer the remote wipe function and location applications for their latest devices, while third party applications are available for other platforms.

Download safe and approved applications

The temptation to download a free, unofficial application on your iPhone or Android instead of purchasing one through iStore, is big, but do you really want to take the risk and expose your phone to malware.  Rather stick legitimate sources where proper quality control is done and applications don’t come with added nasty surprises.

Backup your data

As we’ve already established, a substantial amount of your life is on your smart phone – e-mail, phone contacts, documents, photos and much more. Just as you back up your computer (hopefully!), do the same with your cell phone so you won’t lose everything if you lose your phone.  Many smartphones allow you to make a thorough backup from your device to your pc or at least sync the most important data and settings to an online service.  Many smartphones allow you to make a comprehensive backup of your device to a computer, or to sync your most critical data and settings to an online service.

Skype users targeted by ransomware

Friday, October 12th, 2012

Skype users are being targeted by a round of ransomware that is being sent around as a message from contacts.

The message reads  “lol is this your new profile pic?”, which is followed by a link. If the Skype users clicks on the link, a zip file containing an executable that infects the computer system.

The system is the locked down and displays a message demanding money.

More about the Skype ransomware.

SOURCE: www.mybroadband.co.za

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.