Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Connectivity

What is BYOD?

Friday, March 8th, 2013

Since the beginning of 2011 abbreviation BYOD (Bring your own device) became more common within the IT context. The term refers to the policy which allows employees to use their own devices (smart phones, tablets and laptops) at work to access company information and applications.

Over the past two years BYOD made considerable advances in the business world. To such an extent that at least 60% of employers are already using their own devices (even if in a limited capacity). Businesses can no longer prevent their employees from BYOD and there are various opinions on the pros and cons of BYOD within the company context. 

Also here at Stellenbosch University, we realise that there’s a growing need for staff to buy their own, specialized equipment for work purposes.  However, to succesfully implement BYOD, excellent planning and management is a necessity. Why do we need defined measures and a well formulated policy before we implement? 

To explain this, we need to have a closer look at both the advantages and disadvantages of BYOD. Let’s start with the disadvantages –  

1. In the past BYOD practices have led to data breaches within companies. If an employee uses his smartphone to gain access to the company’s network and subsequently loses the phone, another party can get hold of unsecured data on the phone.   

A security breach could also occur when an employee leaves the service of the company and he/she doesn’t have to return the device. Company applications and data remain on the phone. According to international research only 20% of employees have signed a BYOD contract. 

Companies allowing their employees to use their own devices typically implement a BYOD security policy which clearly explains the company’s position and governance policy to enable the IT department to better manage devices and ensure that network security isn’t under threat. 

2. Company information is less safe on a private device than it would have been within a controlled company environment on a company controlled device. Cost of hardware for the company decreases, but administration and administration costs are much higher. Also, hardware is not entirely controlled by the IT department and more effort is therefore required. 

BYOD can also be to the employee’s disadvantage. Due to security issues and risks, employees don’t have full control over their own devices since the company has to ensure that information is safe at all times. 

On the other side BYOD can also work to the company and employee’s advantage. 

1. A company utilising a BYOD policy, saves money on expensive devices the company would normally supply for their staff. Employees might handle their own devices with more care and at the same time companies will benefit faster from the advantage of newer technology.

2. Employees can choose for themselves which technology they prefer, rather than using the companies prescribed hardware. This freedom promotes productivity and company morale.

Whichever way you look at it, BYOD is here to stay, even within the SU context. Information Technology is currently formulating a policy which includes the usage of personal devices, Digital Rights Management and measures that will be applied. More information on this will follow in a later edition of the Bits & Bytes.

 (SOURCE: www.wikipedia.org en www.webopedia.com)

 

 

 

Keep your cell phone secure

Friday, February 22nd, 2013

These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work information on your device and it’s always connected to the internet.

It’s exactly this convenience that puts you as a smartphone user at risk. Cooltech, iAfrica’s tech section, has a few ideas to minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and other security risks.

Set up a password

Your first line of defense is to simply set up a password on your phone. Most cellphone providers allow you to type in a pin number each time you switch on your phone or after a period on inactivity.

Install security software

Since smart phones are no longer just for storing phone numbers and sms’s, but also bankdetails, they’re also an easy and perfect target for cybercriminals.

Consider installing anti virus software to protect your device against malware. F-Secure, Norton and other large security software vendors each have their own version for the main smartphone platforms.

Activate the remote wipe function

The biggest risk is the the theft or loss of your device. Rather than worry about a stranger snooping through your information, activate the remore wipe function.

This function will allow you, by means of an internet connection, to delete your photos, business contacts and e-mails when you suspect you might not be able to recover your phone.

Some manufacturers like BlackBerry and Apple offer the remote wipe function and location applications for their latest devices, while third party applications are available for other platforms.

Download safe and approved applications

The temptation to download a free, unofficial application on your iPhone or Android instead of purchasing one through iStore, is big, but do you really want to take the risk and expose your phone to malware.  Rather stick legitimate sources where proper quality control is done and applications don’t come with added nasty surprises.

Backup your data

As we’ve already established, a substantial amount of your life is on your smart phone – e-mail, phone contacts, documents, photos and much more. Just as you back up your computer (hopefully!), do the same with your cell phone so you won’t lose everything if you lose your phone.  Many smartphones allow you to make a thorough backup from your device to your pc or at least sync the most important data and settings to an online service.  Many smartphones allow you to make a comprehensive backup of your device to a computer, or to sync your most critical data and settings to an online service.

Don’t be fooled by reactivation

Friday, February 8th, 2013

The first of April is infamous for being the day when everyone gets caught out one way or another. But if you suddenly have no network access on the 3rd of April, it won’t be a joke. It’s more likely that you forgot to reactivate in time.

Unfortunately network reactivation is a requirement for network usage, but also a fairly fast and painless process.

All network users will receive an e-mail from helpinfo@sun.ac.za well in advance with the warning that your username will expire shortly if you do not reactivate.  To save yourself unnecessary frustration, immediately log on to http://www.sun.ac.za/useradm and select “Reactivate username for 2013”.

Make sure you select the correct option. Reactivation is not the same process as changing your password, so don’t click on “Change password”.

The moment your reactivation is submitted, your cost centre manager be e-mailed and able to approve your application. A daily e-mail will also remind the responsible manager of the request and he/she will be able to approve it by logging on at  http://www.sun.ac.za/useradm, selecting “Cost Centre Admin” and view and approve all applications.

Make sure you submit your request early as cost centre managers still have to approve it before 30 March and only then will your access be reactivated.

If you have been caught off guard and without network access on 1 April, first try the self help option at  http://www.sun.ac.za/useradm. (from someone else’s device of course!) Select “Reactivate Expired Username” and your username and ID number will be  requested to verify it’s you.

You can also contact the IT Service Centre. However, keep in mind that this is usually one of the busiest days of the year at the Service Desk so you’ll have to practice a bit of patience and wait longer than usual.

We also compiled a few FAQ’s to try and answer most of your questions (see below). For any additional enquiries, contact help@sun.ac.za

FAQ’S

 1. Why do I have to reactivate each year?
To ensure access to network services.

2. To what services will reactivation give me access?
Personal network space (H-drive), departemental shared space (G-drive), e-mail and internet

3. What is the cost of reactivation?
R177-00

4. Are the costs for the different network services billed seperately?
No, but take note that internet usage is levied as it’s generated.

5. What is the procedure for reactivation?
Log on at http://www.sun.ac.za/useradm and select “Reactivate username for 2013”, familiarise yourself with the ECP’s content, select the network services you require, make sure the cost point is correct and click on “Submit”.

6. What is the ECP and do I really have to read and understand it before I reactivate?
The Electronic Communication Policy contains important imformation regarding staff member’s responsibilities when using the SU network. It’s essential that you read and understand it’s contents before reactivation.

7. Can cost centres be changed during the reactivation process? 
Yes, changes can be made while reactivating.

8. When will my current networkreactivation expire?
30 March2013

9. I can’t reactivate! What now?
Send an e-mail to help@sun.ac.za with a clear explanation of your problem.

10. What happens after I submitted my reactivation application?
The cost centre manager receives and e-mail with the request and processes the application.

11. Should students also reactivate?
No. There are exceptions if undergraduate students have HR rolls.

12. Can postgraduate Masters and Doctoral students reactivate if they work in departments and have a roll at HR?
Yes.

13. What is the responsibility of the cost  centre manager?
Managers have to regularly log in to http://www.sun.ac.za/useradm and use the “Cost Centre Admin”-option to go through and process applications.

14. What happens if the cost  centre manager isn’t available to approve applications? 
Another temporary cost point manager can be assigned by the person responsible for the cost centre.

15. How does a cost centre manager know their are pending applications? 
Managers receive a daily e-mail reminding them or they can log in at http://www.sun.ac.za/useradm and select the “Cost Centre Admin” option.

16. What is the difference between a cost centre manager and the person responsible for the cost centre? (according to the financial system)?
The responsible person for a cost centre and the cost centre manager can both approve applications for SU network services.

17. How are staff reminded to reactivate?
E-mails are sent from helpinfo@sun.ac.za to remind staff of annual reregistration expiry dates.

18.  It’s April 1st and I have’t reactivated. Can I still reregister?
Sign on at http://www.sun.ac.za/useradm and select “Reactivate Expired Username”. Take note: The application still has to be processed by a responsible cost centre manager before network registration is activated.

19. Who can I contact to establish if my application was successful?
Your cost centre mangager.

20. What do I do if my cost centre manager rejected my application?
Log in at http://www.sun.ac.za/useradm, select “Reactivate username for 2013” and make sure you entered the correct cost centre.

INFORMATION SUPPLIED BY PETRO UYS

 

Lower internet rates and faster internet

Wednesday, February 6th, 2013

Thanks to the University’s collaboration with SANREN and the implementation of the new Fortigate firewall, users on campus can now look forward to lower internet rates and faster, more stable internet. Both these projects were necessary if one takes into consideration that the university’s bandwidth usage doubled each year for the past 8 years. In spite of the increase in usage, rates were never increased.

 

RATES FOR INTERNET USAGE FROM 1 JANUARY 2013

Tariff A @R0.02/MB: Monday-Friday: 08h00-23h59

Tariff B @ R0.01/MB : Monday-Friday: 00h00-07h59, as well as Saturdays and Sundays

 

Take note that the relevant tariff is determined by the day and time the download process was completed.

•Example 1: If you start downloading a file of 3 MB at 16:55 on Monday and the download is completed at 17:10 (Monday), the tariff for Monday 17:10 will apply.

•Example 2: If the same file is downloaded from Monday 07:55 to Monday 08:10, the tariff for Monday 08:10 will apply.

 

 

Forgot your password after the holiday?

Friday, January 25th, 2013

Forgetting your password after the holiday only means one thing – you had a long, good rest and managed to forget about work. The only problem now is getting access to your computer …

Well, you’re not the only one. Unfortunately the IT Service Desk is inundated with calls this time of year exactly for this reason. But did you know you can save yourself the frustration and reset it yourself by using the Password Self help function online? Not only is this system fast and effective, but it’s also more secure because you’re changing your password yourself.

The password selfhelp function can be found on the staff portal (my.sun.ac.za) by clicking on “Forgot password”. The following prompts will appear. Just follow the two easy steps and you’ll be able to change your password.

Take note that your cellphone and other personal information has to be up to date on SUN-e-HR  to make use of this function. If you experience any problems with the system, send an e-mail to help@sun.ac.za

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.