%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250716061834+00'00') /ModDate (D:20250716061834+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 1975 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 456.071 521.469 290.663 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 456.446 520.719 289.913 re S 0.773 0.773 0.773 rg 61.016 471.821 m 550.984 471.821 l 550.984 472.571 l 61.016 472.571 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(IMPORTANT DATES)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F1 9.0 Tf [(DELIVERIES:)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(Last day for deliveries \(2021\) from suppliers to Information Technology: )] TJ ET BT 347.630 617.431 Td /F1 9.0 Tf [(21)] TJ ET BT 357.638 620.095 Td /F1 9.0 Tf [(st)] TJ ET BT 365.639 617.431 Td /F1 9.0 Tf [( of December )] TJ ET BT 61.016 606.442 Td /F1 9.0 Tf [(2021)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(First day of deliveries \(2022\) from suppliers to Information Technology: )] TJ ET BT 345.119 586.453 Td /F1 9.0 Tf [(11)] TJ ET BT 355.127 589.117 Td /F1 9.0 Tf [(th)] TJ ET BT 363.623 586.453 Td /F1 9.0 Tf [( January 2022.)] TJ ET BT 61.016 566.464 Td /F1 9.0 Tf [(COLLECTIONS:)] TJ ET BT 61.016 546.475 Td /F4 9.0 Tf [(Last day for collection \(2021\) from Information Technology by clients or departments: )] TJ ET BT 61.016 535.486 Td /F1 9.0 Tf [(23th December 2021 at 12:00)] TJ ET BT 61.016 515.497 Td /F4 9.0 Tf [(First day for collection \(2022\) from Information Technology by clients or departments: )] TJ ET BT 402.143 515.497 Td /F1 9.0 Tf [(5)] TJ ET BT 407.147 518.161 Td /F1 9.0 Tf [(th)] TJ ET BT 61.016 504.508 Td /F1 9.0 Tf [(January 2022)] TJ ET 0.400 0.400 0.400 rg BT 61.016 486.019 Td /F2 9.0 Tf [(Posted in:General | | With 0 comments)] TJ ET q 111.750 0 0 171.000 439.234 475.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 149 /Height 228 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 5269>> stream !Adobed            " 0!1"32@&A#   !10AQq"2BRb ar#3CSs$@c4Dd!1 AQ"2RbaqBrґ0#3D4d P 'r,62$#Wi:#~m}JN 7k~|Gʠ}T|Gʠ}T|Gʠ}T|Ԉx@T䂨 5ErJsKO%hb#pQ .(tĺWB X3>8T,.zOmfs73?~QZ4(]I +.V4? [r/)Fg-vG&dFFʻm;m5*gnbo7FȣbmXuSi~# d^uXyd\g),wv+ 'F?r[乳!ϕ-5iFM*(Jxד!Jrb:y sXI@.@p jbaYT7Ǫ',Fj;? ?@==Ԁ=tXa ? ]Nq{Av@^U89h527ugNco°2vy9rӫ7Q.s,,ߣ[-[5KegƱFZcIbF_vCVΟ$I#  A!FHO}sߔ8T6ɭWEӥP@%UVmNClK0xD99S~qmjcb2#^4#J\`k!b+ywB2\DWYJ(8QN"ںڕ0kQ,# &̯l F2\_.8oQ($xٺ}^N DvZV.N *Hf>e @y:jx;$J[Ǩ\[;ҷeؼ]~xMvVBpyv(J^^I*Y#bKSgk쌊#%!mpBJ\r\v:rTal)tƅ ^E1e@Pr Uf+58p"qD ]gXèF8[a qg_xxZZ utP 8n/SJiYll6svPJ=/ql#{ h B(Y|֠~IzlN]#Cl5~ Ff|RPԲpɭB:LHϿ8ӬTQO9\rr??Džz 'J!qxA9.*2i2pmD\CQQ+^Njw`lJ 4т;ϭVjщڳ~_/4vh³Z v7u=ʙh. UFPՎP1e:ciB5*,^ f.PAaT3 ʣI e5sK eFp1׮0:kJgxBJ?4h_=Q7bc81_)km222g^4?ljLYdexV)*.{FȾyg3Gǃ9#eoL_$G@7z[^ODMCvJu J_ac?Xʠ[|$20`ZuE%^ d Ӫ-3:("+K d>"I]%;X]'vFQ|^aiZs٧ o1 \۞Of2 42V t/^i{$,m %6{wl[ͺ3&iyjOh,W6Y3 8q16?-V(&CpU>ym d%7B# "yP/PNM'G#Sq5auW %xy13_lŸ^'_+ 1b_?LpQu!OU9Ϋ<&TJ]GUZmK1W-)nlh8|5ОtgQ:qcw"m,ۊ u7~DED?e@AǭZi8$ʣ}OJL%f޵fʻgk5$ZsV"֫zkG5iq^z3x?YW_$C 4.$^crq'F[6[1buZ-bIqQy)&x݋\'-s xGUh}V1۷D/7/|WXV&1 Ni"Zsx~/FG ߔS~cYBś.fvϗqwfڧ9aѤ 3YGJa$:, 3պ: p LqN :I S7WojC}TxPkv ]U P3k|'ߗO {b:'ը6q1GåƐ~o.O謹D)Sk\cWo˒e19&5M}1rB4D JЦlD_.L4s8G ,В<2s%0Pбc#b8@ͦ3zkXiNc2zhtf֚+rAV%cwbK3nY#iBsc(+I? m`8|Z^7+H4]ʃNޙ# "L-E[Zj5 # Ms#8Y15DzDTo 2pQw3UAW8tPjm'C;Eܖc ߋ7R3A5uBxF@$`t(-tt!(2*6,Ui蓉8t,+͉fi*@`Spڿa-fnM$}}u' Mi=iNfռ8t؅gY۟7kx| 7[i/MϠTX{Jh'pm饼$f397.u 8&:c'|ۗ i#)Б<$cΑRotJnSmqld]s2.M\1VҎ1*Aj"hN cC057tPP8Sx؂VjtMHTäyx~Z,o: JkfPIGEXQ7[z;ji#ڹHN-aP|)&nQ~;nrO)JYT\lDVgِ#=E`/NWHZlII y[j#Z()))v!p ^gk#mj(%Lx;1QySÜr`UƆƆX[}'D$s>i;llufF]CWM)8'ҽ*mQx6C.?_u1ŏuZڶH2Fį5XQ7;6ؙZ8jcKɳ=FutN}G}"];w!UA,4;fE,O7(٤uؤV_>.~^~oxr endstream endobj xref 0 13 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000570 00000 n 0000002597 00000 n 0000002709 00000 n 0000002824 00000 n 0000002944 00000 n 0000003052 00000 n trailer << /Size 13 /Root 1 0 R /Info 5 0 R >> startxref 8489 %%EOF General « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

ENSURE SECURE PASSWORDS AND UTILIZE A PASSWORD MANAGER

Tuesday, October 17th, 2023

In the context of a higher education environment, where the scope of Stellenbosch University’s online activities continues to expand, it’s become commonplace for the average user to manage an ever-increasing number of passwords. Gone are the days when just a handful would suffice; now, we may find ourselves juggling upwards of 100 unique passwords, especially when practicing strong password security. To mitigate the challenges of remembering these numerous access codes and bolster our accounts’ security, we strongly recommend using password managers.

Our guidance and suggestions

Selecting a weak or easily guessable password is akin to locking the door but carelessly leaving the key in the lock. Malicious actors, including computer hackers, can swiftly exploit such passwords. However, the good news is that employing strong passwords constitutes one of the simplest and most effective measures to safeguard your accounts, thereby reducing the risk of unauthorized access to sensitive information, data, finances, and even your personal identity.

Enhance your passwords with the following strategies

1. Length matters: Passwords that are at least 14 characters long offer the highest level of security. This is also a requirement of the new password regulation.

2. Complexity is key: Create passwords using a random combination of uppercase and lowercase letters, numbers, and symbols. If you need to remember your password, consider crafting a memorable “passphrase” comprising 5 to 7 unrelated words. Feel free to inject creativity into your spelling or incorporate numbers and symbols.

3. One for each: Ensure that each account employs a unique password.

Admittedly, it’s virtually impossible to remember long and unique passwords for the myriad accounts in our academic and personal lives. Rather than resorting to the risky practice of jotting them down or reusing weak passwords, we advocate the use of a password manager.

Password managers are designed to generate intricate and one-of-a-kind passwords on your behalf. They securely store all of these passwords in one central location and promptly alert you to instances of weak, reused, or compromised passwords. Moreover, they can automatically input your login credentials into websites and applications through a secure browser plugin. The only password you need to remember is the master password used to access the password manager itself.

(Pro Tip: Craft a memorable, lengthy “passphrase” as mentioned earlier, and never commit your master password to writing.)

Key statistics to consider

It’s worth noting that in our educational community, only 33% of individuals have adopted the practice of creating unique passwords for all their accounts. Additionally, a mere 18% have availed themselves of the security offered by a password manager. These statistics underscore the importance of promoting and implementing strong password practices and the use of password management tools within our academic environment.

Password Regulations

 

User Guide: Multi-Factor Authentication (MFA) with Google Authenticator app

Monday, October 2nd, 2023

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application (e.g., SUNFin and SUNStudent), an online account, or a VPN. MFA is a core component of a strong identity and access management (IAM) policy.

SU has implemented the Google Authenticator App method to authenticate with your Huawei mobile device or any other mobile device that does not have the Microsoft Authentication app available in their app store.

In this document we show you how to register your device: 

MFA with Google Auth app – How to guide

Microsoft Security Update

Thursday, September 28th, 2023

The use of an authenticator application as a method to verify your identity with Multi-Factor Authentication (MFA) is now a COMPULSARY requirement from Microsoft. 

You need to install the Microsoft Authenticator application on your Android or Apple smartphone or tablet as soon as possible.

In this PDF below is what you can expect to experience well as how to install the app when Microsoft starts the deployment.

How to set up Microsoft Authenticator

The latest password regulations

Wednesday, September 27th, 2023

 

A lot of people still underestimate the importance of having a secure password and make the mistake of using simple words and numbers as a password. Keep in mind that your email and social media accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

Here we provide you with standards and guidelines for the creation of strong passwords, the protection of those passwords and the frequency of change. 

Password requirements

Length:

Must be at least 14 characters long
Use a passphrase like a sentence, for example Coffee1_first!

Complexity:

Use alphanumerical characters for example: C0ff33_f1rst!
At least one uppercase letter (A-Z)
At least one lowercase letter (a-z)
At least one number (0-9)
At least one special character (~!@#$%^&*()_+”:?> (leaving a space is also a character but not at the end of the passphrase)

History:

The passwords are stored in a history list keeping a record of the last 10 passwords

Age:

The minimum password age is set to 30 days

Banning:

A deny list will prevent users from using password from dictionaries, repetitive or sequential characters

User responsibility

  1. Stellenbosch University (SU) passwords must meet the requirements outlined in the requirements section
  2. SU passwords must be unique and different from other personal services
  3. SU passwords must be changed and the request to change will be by the system
  4. SU passwords may not be shared
  5. SU passwords must never be written down

Reset options

Self-service Password Reset

OR Send an email to info@sun.ac.za or help@sun.ac.za

PLEASE NOTE: A user’s identification must be verified either in person or video conference

SU Password Regulations

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.