%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250713074454+00'00') /ModDate (D:20250713074454+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2269 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 483.071 521.469 263.663 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 483.446 520.719 262.913 re S 0.773 0.773 0.773 rg 61.016 498.821 m 550.984 498.821 l 550.984 499.571 l 61.016 499.571 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(IT MAINTENANCE: FEEDBACK)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(During both the weekends of 18 June and 12 July Information Technology carried out essential maintenance on various )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(servers and systems. In both cases we encountered problems which caused some systems and services to be )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(unavailable over the weekend, as well as into the following week. These outages were mainly caused by ageing )] TJ ET BT 61.016 604.453 Td /F4 9.0 Tf [(technology and complex inter-dependencies between systems which make 100% availability difficult to achieve.)] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(All systems and services have since been restored and are all once again online. We realise that disruptions such as )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(these impact directly on the productivity of, and services to, our staff and students and although we try to limit them to a )] TJ ET BT 61.016 562.486 Td /F4 9.0 Tf [(minimum, sometimes complexity has unpredictable consequences. We apologise for the inconvenience during these )] TJ ET BT 61.016 551.497 Td /F4 9.0 Tf [(downtimes and can assure you that we try our best to ensure optimal service.)] TJ ET BT 61.016 531.508 Td /F4 9.0 Tf [(For inquiries please contact the IT Service Desk at 021 808 4367 or log a request on the )] TJ ET 0.373 0.169 0.255 rg BT 414.698 531.508 Td /F4 9.0 Tf [(ICT Partner Portal)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 414.698 530.357 m 487.220 530.357 l S 0.400 0.400 0.400 rg BT 61.016 513.019 Td /F2 9.0 Tf [(Posted in:Connectivity,General | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 414.6977 530.6752 487.2197 539.8327 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za) >> endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000554 00000 n 0000002875 00000 n 0000002987 00000 n 0000003102 00000 n 0000003222 00000 n 0000003330 00000 n 0000003458 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 3539 %%EOF General « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

ENSURE SECURE PASSWORDS AND UTILIZE A PASSWORD MANAGER

Tuesday, October 17th, 2023

In the context of a higher education environment, where the scope of Stellenbosch University’s online activities continues to expand, it’s become commonplace for the average user to manage an ever-increasing number of passwords. Gone are the days when just a handful would suffice; now, we may find ourselves juggling upwards of 100 unique passwords, especially when practicing strong password security. To mitigate the challenges of remembering these numerous access codes and bolster our accounts’ security, we strongly recommend using password managers.

Our guidance and suggestions

Selecting a weak or easily guessable password is akin to locking the door but carelessly leaving the key in the lock. Malicious actors, including computer hackers, can swiftly exploit such passwords. However, the good news is that employing strong passwords constitutes one of the simplest and most effective measures to safeguard your accounts, thereby reducing the risk of unauthorized access to sensitive information, data, finances, and even your personal identity.

Enhance your passwords with the following strategies

1. Length matters: Passwords that are at least 14 characters long offer the highest level of security. This is also a requirement of the new password regulation.

2. Complexity is key: Create passwords using a random combination of uppercase and lowercase letters, numbers, and symbols. If you need to remember your password, consider crafting a memorable “passphrase” comprising 5 to 7 unrelated words. Feel free to inject creativity into your spelling or incorporate numbers and symbols.

3. One for each: Ensure that each account employs a unique password.

Admittedly, it’s virtually impossible to remember long and unique passwords for the myriad accounts in our academic and personal lives. Rather than resorting to the risky practice of jotting them down or reusing weak passwords, we advocate the use of a password manager.

Password managers are designed to generate intricate and one-of-a-kind passwords on your behalf. They securely store all of these passwords in one central location and promptly alert you to instances of weak, reused, or compromised passwords. Moreover, they can automatically input your login credentials into websites and applications through a secure browser plugin. The only password you need to remember is the master password used to access the password manager itself.

(Pro Tip: Craft a memorable, lengthy “passphrase” as mentioned earlier, and never commit your master password to writing.)

Key statistics to consider

It’s worth noting that in our educational community, only 33% of individuals have adopted the practice of creating unique passwords for all their accounts. Additionally, a mere 18% have availed themselves of the security offered by a password manager. These statistics underscore the importance of promoting and implementing strong password practices and the use of password management tools within our academic environment.

Password Regulations

 

User Guide: Multi-Factor Authentication (MFA) with Google Authenticator app

Monday, October 2nd, 2023

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application (e.g., SUNFin and SUNStudent), an online account, or a VPN. MFA is a core component of a strong identity and access management (IAM) policy.

SU has implemented the Google Authenticator App method to authenticate with your Huawei mobile device or any other mobile device that does not have the Microsoft Authentication app available in their app store.

In this document we show you how to register your device: 

MFA with Google Auth app – How to guide

Microsoft Security Update

Thursday, September 28th, 2023

The use of an authenticator application as a method to verify your identity with Multi-Factor Authentication (MFA) is now a COMPULSARY requirement from Microsoft. 

You need to install the Microsoft Authenticator application on your Android or Apple smartphone or tablet as soon as possible.

In this PDF below is what you can expect to experience well as how to install the app when Microsoft starts the deployment.

How to set up Microsoft Authenticator

The latest password regulations

Wednesday, September 27th, 2023

 

A lot of people still underestimate the importance of having a secure password and make the mistake of using simple words and numbers as a password. Keep in mind that your email and social media accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

Here we provide you with standards and guidelines for the creation of strong passwords, the protection of those passwords and the frequency of change. 

Password requirements

Length:

Must be at least 14 characters long
Use a passphrase like a sentence, for example Coffee1_first!

Complexity:

Use alphanumerical characters for example: C0ff33_f1rst!
At least one uppercase letter (A-Z)
At least one lowercase letter (a-z)
At least one number (0-9)
At least one special character (~!@#$%^&*()_+”:?> (leaving a space is also a character but not at the end of the passphrase)

History:

The passwords are stored in a history list keeping a record of the last 10 passwords

Age:

The minimum password age is set to 30 days

Banning:

A deny list will prevent users from using password from dictionaries, repetitive or sequential characters

User responsibility

  1. Stellenbosch University (SU) passwords must meet the requirements outlined in the requirements section
  2. SU passwords must be unique and different from other personal services
  3. SU passwords must be changed and the request to change will be by the system
  4. SU passwords may not be shared
  5. SU passwords must never be written down

Reset options

Self-service Password Reset

OR Send an email to info@sun.ac.za or help@sun.ac.za

PLEASE NOTE: A user’s identification must be verified either in person or video conference

SU Password Regulations

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.