%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250722225417+00'00') /ModDate (D:20250722225417+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4940 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 384.170 521.469 362.564 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 384.545 520.719 361.814 re S 0.773 0.773 0.773 rg 61.016 399.920 m 550.984 399.920 l 550.984 400.670 l 61.016 400.670 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(BEFORE YOU LEAVE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(The December holiday is almost here and especially this year, we're all looking forward to escaping for a week or two. But )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(before you leave, there are a few things you can do now to ensure that your return is seamless. Here are a few tips: )] TJ ET BT 78.360 598.958 Td /F4 9.0 Tf [(1.)] TJ ET 0.373 0.169 0.255 rg BT 91.016 598.942 Td /F4 9.0 Tf [(Activate your )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 597.791 m 145.538 597.791 l S BT 145.538 598.942 Td /F1 9.0 Tf [(Out of Office)] TJ ET 0.18 w 0 J [ ] 0 d 145.538 597.512 m 200.042 597.512 l S BT 200.042 598.942 Td /F4 9.0 Tf [( function)] TJ ET 0.18 w 0 J [ ] 0 d 200.042 597.791 m 234.062 597.791 l S 0.153 0.153 0.153 rg BT 234.062 598.942 Td /F4 9.0 Tf [( on your sun.ac.za Outlook mailbox and indicate in the message when you will )] TJ ET BT 91.016 587.953 Td /F4 9.0 Tf [(be available again in case someone needs to contact you. Also, indicate who will be responsible during your time )] TJ ET BT 91.016 576.964 Td /F4 9.0 Tf [(away and add their email address to your Out of Office.)] TJ ET BT 78.360 565.991 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 565.975 Td /F4 9.0 Tf [(Make sure that your relevant )] TJ ET BT 207.566 565.975 Td /F1 9.0 Tf [(work-related data)] TJ ET BT 282.086 565.975 Td /F4 9.0 Tf [( is accessible for usage by your colleagues while you are away. )] TJ ET BT 91.016 554.986 Td /F4 9.0 Tf [(However, do NOT give your password to colleagues when as this poses a security risk.)] TJ ET BT 78.360 544.013 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 543.997 Td /F4 9.0 Tf [(If your sun password might expire during your holiday, )] TJ ET 0.373 0.169 0.255 rg BT 309.104 543.997 Td /F4 9.0 Tf [(rather )] TJ ET 0.18 w 0 J [ ] 0 d 309.104 542.846 m 335.114 542.846 l S BT 335.114 543.997 Td /F1 9.0 Tf [(change it before you go)] TJ ET 0.18 w 0 J [ ] 0 d 335.114 542.567 m 436.634 542.567 l S BT 436.634 543.997 Td /F4 9.0 Tf [(.)] TJ ET 0.18 w 0 J [ ] 0 d 436.634 542.846 m 439.136 542.846 l S 0.153 0.153 0.153 rg BT 439.136 543.997 Td /F4 9.0 Tf [( If it expires while you are )] TJ ET BT 91.016 533.008 Td /F4 9.0 Tf [(away you will be locked out of your account and it will cause unnecessary stress to deactivate it in January. )] TJ ET BT 78.360 522.035 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 522.019 Td /F4 9.0 Tf [(If you receive a )] TJ ET BT 154.547 522.019 Td /F1 9.0 Tf [(phishing email on your sun account)] TJ ET BT 308.582 522.019 Td /F4 9.0 Tf [( over the holiday and clicked on links or typed in your )] TJ ET BT 91.016 511.030 Td /F4 9.0 Tf [(username and password, your account may be compromised. Immediately change your password at )] TJ ET BT 91.016 500.041 Td /F4 9.0 Tf [(www.sun.ac.za/password and )] TJ ET 0.373 0.169 0.255 rg BT 212.561 500.041 Td /F4 9.0 Tf [(log a service request on the ICT Partner Portal)] TJ ET 0.18 w 0 J [ ] 0 d 212.561 498.890 m 398.141 498.890 l S 0.153 0.153 0.153 rg BT 398.141 500.041 Td /F4 9.0 Tf [(. Your device will then be checked )] TJ ET BT 91.016 489.052 Td /F4 9.0 Tf [(and scanned after the holiday. Remember that you can also report spam directly to Microsoft by using the handy )] TJ ET 0.373 0.169 0.255 rg BT 91.016 478.063 Td /F4 9.0 Tf [(Report Message function in Outlook)] TJ ET 0.18 w 0 J [ ] 0 d 91.016 476.912 m 234.080 476.912 l S 0.153 0.153 0.153 rg BT 234.080 478.063 Td /F4 9.0 Tf [(.)] TJ ET BT 78.360 467.090 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 467.074 Td /F1 9.0 Tf [(Information Technology will also be closing,)] TJ ET BT 280.565 467.074 Td /F4 9.0 Tf [( like the rest of the University, )] TJ ET BT 401.111 467.074 Td /F1 9.0 Tf [(on 24 December and opening )] TJ ET BT 91.016 456.085 Td /F1 9.0 Tf [(again on 3 January)] TJ ET BT 172.547 456.085 Td /F4 9.0 Tf [(. If possible, please log your IT requests as soon as possible before you leave. If you have a )] TJ ET BT 91.016 445.096 Td /F4 9.0 Tf [(critical problem, it might be difficult to assist you a day before you leave or on the last Friday since suppliers also )] TJ ET BT 91.016 434.107 Td /F4 9.0 Tf [(close over the festive season.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 414.118 Td /F2 9.0 Tf [(Posted in:General,Tips | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 598.1092 179.5577 607.2667 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-za/help/290846/how-to-use-the-out-of-office-assistant-in-outlook) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 145.5377 598.1092 200.0417 607.2667 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-za/help/290846/how-to-use-the-out-of-office-assistant-in-outlook) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 309.1037 543.1642 337.6157 552.3217 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/password) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 335.1137 543.1642 436.6337 552.3217 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/password) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 212.5607 499.2082 398.1407 508.3657 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 477.2302 234.0797 486.3877 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (https://support.microsoft.com/en-us/office/use-the-report-message-add-in-b5caa9f1-cdf3-4443-af8c-ff724ea719d2) >> endobj xref 0 24 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000589 00000 n 0000005581 00000 n 0000005693 00000 n 0000005808 00000 n 0000005928 00000 n 0000006036 00000 n 0000006163 00000 n 0000006312 00000 n 0000006440 00000 n 0000006589 00000 n 0000006717 00000 n 0000006798 00000 n 0000006926 00000 n 0000007007 00000 n 0000007135 00000 n 0000007216 00000 n 0000007343 00000 n trailer << /Size 24 /Root 1 0 R /Info 5 0 R >> startxref 7504 %%EOF General « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

New IT head puts spotlight on cybersecurity at Stellenbosch University

Monday, October 24th, 2022

Paper sheet with cybersecurity plan concept written on it

About six years ago, when Dr Denisha Jairam-Owthar was working as Chief Information Officer for the City of Johannesburg, the city was subjected to a massive cyber-attack which brought the organisation to a grinding halt. Hackers got into the city’s network and demanded money. The metro – the biggest in South Africa – had to switch to disaster recovery mode and all systems had to be shut down.

“That was when I experienced, first hand, the magnitude of a cyber-attack on this scale,” Dr Jairam-Owthar said.  

“When this sort of attack happens, the whole technical team faces a mammoth, urgent task. You have to look at every single system and find out where the vulnerability was. While you’re doing all this, you must ensure the organisation can continue to operate. This must all happen in parallel. There is no level of tracking or planning on paper that can prepare you for that day.”

At the time of the cyber-attack, Dr Jairam-Owthar had a four-month-old son. But that didn’t stop her from joining her team in working a gruelling 90 hours a week. “My staff and I brought sleeping bags so that we could sleep at the office, working shifts, sleeping for three or four hours at a time, manning our nerve centre to technically unravel this cyber-attack.” Her baby became sick from not seeing his mum, and the paediatrician asked what was happening at home. She explained that she was dealing with a crisis – and had no option but to soldier on.

Fast forward to today – and, as Stellenbosch University’s Chief Director: Information Technology Division, Dr Jairam-Owthar is always, on high alert for cyber-attacks on the campus. “Cybersecurity is one of those things that keeps me awake at night,” she said.

In an extensive interview, Dr Jairam-Owthar (39), who took up the position in January this year, was reassuring that SU is in safe hands. But with risks always at play, she stressed that cybersecurity should be “everybody’s business” on campus.

“Cybersecurity is a hot topic, because it is becoming increasingly prevalent. We see cyber-attacks on prominent organisations on a daily basis. They might have all the controls in place, but it just takes that one vulnerability to probe the weakness to come through – and before you know it, the entire network has been permeated.  It is not a matter of if a cyber-attack is going to happen … it’s a matter of when,” she said.

“CIOs have no option but to ensure that their cybersecurity systems are well resourced and resilient. The cost impacts on organisations and on society as a whole can be very difficult to come back from. Every CIO must be ready for when this happens and know how to respond – on a technical level, and on other levels, like how the institution deals with the situation.”

Dr Jairam-Owthar said the Covid-19-driven switch to digital acceleration has contributed hugely to the growth in cybercrime. “So many people suddenly found themselves working from home and depending on digital platforms. Cyber criminals quickly understood they could exploit this situation. Hackers are also highly aware that, in developing economies, many institutions do not update and upgrade their technology and infrastructure, and that’s where the vulnerability sits. These very intelligent hackers know we are challenged with funding, to keep up with technology. This is why countries in Africa become targets.”

Moving to why cybersecurity is so important for SU, she said: “This is an institution of real excellence in academics and research. We have researchers across many faculties, and there is so much research data in the system. Ethics in research is so critical. You cannot release the data unless you have followed all the processes. It is absolutely vital to ensure that the data, network and our online systems is well secured.

“On top of this, the system contains a great deal of students’ personal information – their exam marks, certificates and their whole student life cycle information. This could all be affected in a cyber-attack. When an attack happens, the reputation of the entire university comes into question, and those who fund research could become sceptical.

“I have to be able to say to my bosses at SU, hand on heart, that I’ve done everything I can to protect all our systems, network and information.”

Giving strong reassurance that SU is in safe hands,  Dr Jairam-Owthar said cybersecurity was high on her agenda when she joined the university in January. “With the support of the university’s leadership, we did an assessment of where we stand.  It found that we are well within the industry norm but there’s a lot more to do because, when it comes to cybersecurity, we are faced with a moving target. We cannot be static or complacent about it. So while we are fine in terms of the industry norm, we have to always drive to improve. The most critical challenge for CIOs is to keep up with this moving target of cybersecurity.

“We do have our controls in place as a university, but … even if we put in excellent controls; someone in Amsterdam for example can find a vulnerability. We have to be on the pulse, staying ahead of the target – because it is moving all the time.”

Dr Jairam-Owthar said there is also the issue of balancing costs. “Our partnerships with our vendors, such as Microsoft, become critical. We have to consistently ensure our vendors deliver value. The skill lies in balancing shrinking budgets with moving targets and higher expectations of technology.”

When she was at the City of Johannesburg, Dr Jairam-Owthar played a key role in the institution’s IT Digital Transformation. Passionate about education, she believes her role at SU is to enable education through technology at SU, because IT is a ‘critical enabler’ in the transformation of education”.

“The impact of what we do is to enable students and staff to be educated. That is the part that speaks to me as a person. Education holds a place in my heart.”

Dr Jairam-Owthar said the university recently did an analysis using the National Information Security Technology (NIST) cybersecurity framework.

“The NIST is a tool which does a full analysis of the entire IT environment and where the weaknesses lie, and how to prioritise to close the gap. That report has been done, and we are engaging on it in terms of priority and the budget to start implementing it to strengthen our controls and security,” she said.

Turning back to the incident at the City of Johannesburg, Dr Jairam-Owthar said it was “like walking through fire”.

“It’s like having an intruder in your home, and you are standing in the house and you don’t know which door the intruder came in. I never want anyone to go through that again. I wouldn’t wish it on anyone. We need to be well prepared.”

Asked what her main message to SU students and staff is when it comes to cybersecurity, she said:

“My main message is that cybersecurity is everyone’s responsibility, not just that of the IT Division. Everyone on campus – staff and students – need to play their role. To stress the importance of this, we will soon launch our cybersecurity training aimed at strengthening our human firewall which is the staff and students. Everyone on the campus, must do their bit to strengthen this human firewall.

“SU has such excellence in academia and research. Let’s work together to find the gaps and strengthen the systems. It’s the simple things like don’t share your passwords, make sure you authenticate when you get on the network, don’t go to sites that look odd; being able identify a phishing email. Check with us if you are not sure. If you get an email that doesn’t sound right, talk to us and we will guide you. Most cyber-attacks come through the human firewall. We cannot work in silos for cybersecurity either. We need a holistic approach for SU for cybersecurity. Lastly, make sure you do the training, it will empower you on what to look out for.”

When Dr Jairam-Owthar looks at her son, now a healthy, happy hi-tech six-year-old, she sees a boy who “handles a phone, an Ipad and a computer all at once”.

“It is for this generation that we need to bring the university into the digital fourth industrial revolution.

“I say to my IT staff that; our primary stakeholders are the 33 000 students and the 3500 staff of this university. I want to know what our primary stakeholders look for in technology so we can meet their demands in a safe and secure way, where we are also implementing a key principle of ‘security by design’ on any technologies we implement”.

Image credit: Formatoriginalphotos

Something’s Phishy…

Monday, October 24th, 2022

 

Internet down Sunday morning

Friday, February 25th, 2022

Due to critical maintenance by TENET, our internet service provider, internet services will be down on Sunday, 27 February from 00:00 am to 03:00 am.

During these three hours there will be no access to the internet. We apologise for the inconvenience. Any enquiries can be logged on servicedesk.sun.ac.za.

Important dates

Tuesday, November 30th, 2021

DELIVERIES:

Last day for deliveries (2021) from suppliers to Information Technology: 21st of December 2021

First day of deliveries (2022) from suppliers to Information Technology: 11th January 2022.

COLLECTIONS:

Last day for collection (2021) from Information Technology  by clients or departments:  23th  December 2021 at 12:00

First day for collection (2022) from Information Technology by clients or departments: 5th January 2022

Before you leave

Tuesday, November 30th, 2021

The December holiday is almost here and especially this year, we’re all looking forward to escaping for a week or two. But before you leave, there are a few things you can do now to ensure that your return is seamless. Here are a few tips: 

  1. Activate your Out of Office function on your sun.ac.za Outlook mailbox and indicate in the message when you will be available again in case someone needs to contact you. Also, indicate who will be responsible during your time away and add their email address to your Out of Office.
  2. Make sure that your relevant work-related data is accessible for usage by your colleagues while you are away. However, do NOT give your password to colleagues when as this poses a security risk.
  3. If your sun password might expire during your holiday, rather change it before you go. If it expires while you are away you will be locked out of your account and it will cause unnecessary stress to deactivate it in January. 
  4. If you receive a phishing email on your sun account over the holiday and clicked on links or typed in your username and password, your account may be compromised. Immediately change your password at www.sun.ac.za/password and log a service request on the ICT Partner Portal. Your device will then be checked and scanned after the holiday. Remember that you can also report spam directly to Microsoft by using the handy Report Message function in Outlook.
  5. Information Technology will also be closing, like the rest of the University, on 24 December and opening again on 3 January. If possible, please log your IT requests as soon as possible before you leave. If you have a critical problem, it might be difficult to assist you a day before you leave or on the last Friday since suppliers also close over the festive season.
 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.