%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250716211748+00'00') /ModDate (D:20250716211748+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4940 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 384.170 521.469 362.564 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 384.545 520.719 361.814 re S 0.773 0.773 0.773 rg 61.016 399.920 m 550.984 399.920 l 550.984 400.670 l 61.016 400.670 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(BEFORE YOU LEAVE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(The December holiday is almost here and especially this year, we're all looking forward to escaping for a week or two. But )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(before you leave, there are a few things you can do now to ensure that your return is seamless. Here are a few tips: )] TJ ET BT 78.360 598.958 Td /F4 9.0 Tf [(1.)] TJ ET 0.373 0.169 0.255 rg BT 91.016 598.942 Td /F4 9.0 Tf [(Activate your )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 597.791 m 145.538 597.791 l S BT 145.538 598.942 Td /F1 9.0 Tf [(Out of Office)] TJ ET 0.18 w 0 J [ ] 0 d 145.538 597.512 m 200.042 597.512 l S BT 200.042 598.942 Td /F4 9.0 Tf [( function)] TJ ET 0.18 w 0 J [ ] 0 d 200.042 597.791 m 234.062 597.791 l S 0.153 0.153 0.153 rg BT 234.062 598.942 Td /F4 9.0 Tf [( on your sun.ac.za Outlook mailbox and indicate in the message when you will )] TJ ET BT 91.016 587.953 Td /F4 9.0 Tf [(be available again in case someone needs to contact you. Also, indicate who will be responsible during your time )] TJ ET BT 91.016 576.964 Td /F4 9.0 Tf [(away and add their email address to your Out of Office.)] TJ ET BT 78.360 565.991 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 565.975 Td /F4 9.0 Tf [(Make sure that your relevant )] TJ ET BT 207.566 565.975 Td /F1 9.0 Tf [(work-related data)] TJ ET BT 282.086 565.975 Td /F4 9.0 Tf [( is accessible for usage by your colleagues while you are away. )] TJ ET BT 91.016 554.986 Td /F4 9.0 Tf [(However, do NOT give your password to colleagues when as this poses a security risk.)] TJ ET BT 78.360 544.013 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 543.997 Td /F4 9.0 Tf [(If your sun password might expire during your holiday, )] TJ ET 0.373 0.169 0.255 rg BT 309.104 543.997 Td /F4 9.0 Tf [(rather )] TJ ET 0.18 w 0 J [ ] 0 d 309.104 542.846 m 335.114 542.846 l S BT 335.114 543.997 Td /F1 9.0 Tf [(change it before you go)] TJ ET 0.18 w 0 J [ ] 0 d 335.114 542.567 m 436.634 542.567 l S BT 436.634 543.997 Td /F4 9.0 Tf [(.)] TJ ET 0.18 w 0 J [ ] 0 d 436.634 542.846 m 439.136 542.846 l S 0.153 0.153 0.153 rg BT 439.136 543.997 Td /F4 9.0 Tf [( If it expires while you are )] TJ ET BT 91.016 533.008 Td /F4 9.0 Tf [(away you will be locked out of your account and it will cause unnecessary stress to deactivate it in January. )] TJ ET BT 78.360 522.035 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 522.019 Td /F4 9.0 Tf [(If you receive a )] TJ ET BT 154.547 522.019 Td /F1 9.0 Tf [(phishing email on your sun account)] TJ ET BT 308.582 522.019 Td /F4 9.0 Tf [( over the holiday and clicked on links or typed in your )] TJ ET BT 91.016 511.030 Td /F4 9.0 Tf [(username and password, your account may be compromised. Immediately change your password at )] TJ ET BT 91.016 500.041 Td /F4 9.0 Tf [(www.sun.ac.za/password and )] TJ ET 0.373 0.169 0.255 rg BT 212.561 500.041 Td /F4 9.0 Tf [(log a service request on the ICT Partner Portal)] TJ ET 0.18 w 0 J [ ] 0 d 212.561 498.890 m 398.141 498.890 l S 0.153 0.153 0.153 rg BT 398.141 500.041 Td /F4 9.0 Tf [(. Your device will then be checked )] TJ ET BT 91.016 489.052 Td /F4 9.0 Tf [(and scanned after the holiday. Remember that you can also report spam directly to Microsoft by using the handy )] TJ ET 0.373 0.169 0.255 rg BT 91.016 478.063 Td /F4 9.0 Tf [(Report Message function in Outlook)] TJ ET 0.18 w 0 J [ ] 0 d 91.016 476.912 m 234.080 476.912 l S 0.153 0.153 0.153 rg BT 234.080 478.063 Td /F4 9.0 Tf [(.)] TJ ET BT 78.360 467.090 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 467.074 Td /F1 9.0 Tf [(Information Technology will also be closing,)] TJ ET BT 280.565 467.074 Td /F4 9.0 Tf [( like the rest of the University, )] TJ ET BT 401.111 467.074 Td /F1 9.0 Tf [(on 24 December and opening )] TJ ET BT 91.016 456.085 Td /F1 9.0 Tf [(again on 3 January)] TJ ET BT 172.547 456.085 Td /F4 9.0 Tf [(. If possible, please log your IT requests as soon as possible before you leave. If you have a )] TJ ET BT 91.016 445.096 Td /F4 9.0 Tf [(critical problem, it might be difficult to assist you a day before you leave or on the last Friday since suppliers also )] TJ ET BT 91.016 434.107 Td /F4 9.0 Tf [(close over the festive season.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 414.118 Td /F2 9.0 Tf [(Posted in:General,Tips | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 598.1092 179.5577 607.2667 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-za/help/290846/how-to-use-the-out-of-office-assistant-in-outlook) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 145.5377 598.1092 200.0417 607.2667 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-za/help/290846/how-to-use-the-out-of-office-assistant-in-outlook) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 309.1037 543.1642 337.6157 552.3217 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/password) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 335.1137 543.1642 436.6337 552.3217 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/password) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 212.5607 499.2082 398.1407 508.3657 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 477.2302 234.0797 486.3877 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-us/office/use-the-report-message-add-in-b5caa9f1-cdf3-4443-af8c-ff724ea719d2) >> endobj xref 0 24 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000589 00000 n 0000005581 00000 n 0000005693 00000 n 0000005808 00000 n 0000005928 00000 n 0000006036 00000 n 0000006163 00000 n 0000006312 00000 n 0000006440 00000 n 0000006589 00000 n 0000006717 00000 n 0000006798 00000 n 0000006926 00000 n 0000007007 00000 n 0000007135 00000 n 0000007216 00000 n 0000007343 00000 n trailer << /Size 24 /Root 1 0 R /Info 5 0 R >> startxref 7504 %%EOF General « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

ENSURE SECURE PASSWORDS AND UTILIZE A PASSWORD MANAGER

Tuesday, October 17th, 2023

In the context of a higher education environment, where the scope of Stellenbosch University’s online activities continues to expand, it’s become commonplace for the average user to manage an ever-increasing number of passwords. Gone are the days when just a handful would suffice; now, we may find ourselves juggling upwards of 100 unique passwords, especially when practicing strong password security. To mitigate the challenges of remembering these numerous access codes and bolster our accounts’ security, we strongly recommend using password managers.

Our guidance and suggestions

Selecting a weak or easily guessable password is akin to locking the door but carelessly leaving the key in the lock. Malicious actors, including computer hackers, can swiftly exploit such passwords. However, the good news is that employing strong passwords constitutes one of the simplest and most effective measures to safeguard your accounts, thereby reducing the risk of unauthorized access to sensitive information, data, finances, and even your personal identity.

Enhance your passwords with the following strategies

1. Length matters: Passwords that are at least 14 characters long offer the highest level of security. This is also a requirement of the new password regulation.

2. Complexity is key: Create passwords using a random combination of uppercase and lowercase letters, numbers, and symbols. If you need to remember your password, consider crafting a memorable “passphrase” comprising 5 to 7 unrelated words. Feel free to inject creativity into your spelling or incorporate numbers and symbols.

3. One for each: Ensure that each account employs a unique password.

Admittedly, it’s virtually impossible to remember long and unique passwords for the myriad accounts in our academic and personal lives. Rather than resorting to the risky practice of jotting them down or reusing weak passwords, we advocate the use of a password manager.

Password managers are designed to generate intricate and one-of-a-kind passwords on your behalf. They securely store all of these passwords in one central location and promptly alert you to instances of weak, reused, or compromised passwords. Moreover, they can automatically input your login credentials into websites and applications through a secure browser plugin. The only password you need to remember is the master password used to access the password manager itself.

(Pro Tip: Craft a memorable, lengthy “passphrase” as mentioned earlier, and never commit your master password to writing.)

Key statistics to consider

It’s worth noting that in our educational community, only 33% of individuals have adopted the practice of creating unique passwords for all their accounts. Additionally, a mere 18% have availed themselves of the security offered by a password manager. These statistics underscore the importance of promoting and implementing strong password practices and the use of password management tools within our academic environment.

Password Regulations

 

User Guide: Multi-Factor Authentication (MFA) with Google Authenticator app

Monday, October 2nd, 2023

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application (e.g., SUNFin and SUNStudent), an online account, or a VPN. MFA is a core component of a strong identity and access management (IAM) policy.

SU has implemented the Google Authenticator App method to authenticate with your Huawei mobile device or any other mobile device that does not have the Microsoft Authentication app available in their app store.

In this document we show you how to register your device: 

MFA with Google Auth app – How to guide

Microsoft Security Update

Thursday, September 28th, 2023

The use of an authenticator application as a method to verify your identity with Multi-Factor Authentication (MFA) is now a COMPULSARY requirement from Microsoft. 

You need to install the Microsoft Authenticator application on your Android or Apple smartphone or tablet as soon as possible.

In this PDF below is what you can expect to experience well as how to install the app when Microsoft starts the deployment.

How to set up Microsoft Authenticator

The latest password regulations

Wednesday, September 27th, 2023

 

A lot of people still underestimate the importance of having a secure password and make the mistake of using simple words and numbers as a password. Keep in mind that your email and social media accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

Here we provide you with standards and guidelines for the creation of strong passwords, the protection of those passwords and the frequency of change. 

Password requirements

Length:

Must be at least 14 characters long
Use a passphrase like a sentence, for example Coffee1_first!

Complexity:

Use alphanumerical characters for example: C0ff33_f1rst!
At least one uppercase letter (A-Z)
At least one lowercase letter (a-z)
At least one number (0-9)
At least one special character (~!@#$%^&*()_+”:?> (leaving a space is also a character but not at the end of the passphrase)

History:

The passwords are stored in a history list keeping a record of the last 10 passwords

Age:

The minimum password age is set to 30 days

Banning:

A deny list will prevent users from using password from dictionaries, repetitive or sequential characters

User responsibility

  1. Stellenbosch University (SU) passwords must meet the requirements outlined in the requirements section
  2. SU passwords must be unique and different from other personal services
  3. SU passwords must be changed and the request to change will be by the system
  4. SU passwords may not be shared
  5. SU passwords must never be written down

Reset options

Self-service Password Reset

OR Send an email to info@sun.ac.za or help@sun.ac.za

PLEASE NOTE: A user’s identification must be verified either in person or video conference

SU Password Regulations

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.