%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 14 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250719055047+00'00') /ModDate (D:20250719055047+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10064 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 70.079 521.469 676.655 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 70.079 l 565.984 70.079 l 565.984 745.984 l f 45.266 746.734 m 45.266 70.079 l 46.016 70.079 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(COMPUTER LITERACY AND DIGITAL LITERACY NOT THE SAME )] TJ ET BT 61.016 676.134 Td /F1 14.4 Tf [(THING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 647.326 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 647.326 Td /F3 9.0 Tf [(July 06,2023)] TJ ET BT 157.082 647.326 Td /F2 9.0 Tf [( by )] TJ ET BT 171.590 647.326 Td /F3 9.0 Tf [(Amber Viviers)] TJ ET 0.153 0.153 0.153 rg BT 61.016 619.837 Td /F4 9.0 Tf [(Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology )] TJ ET BT 61.016 608.848 Td /F4 9.0 Tf [(users, we need to have both. In this article we explore the difference between these two concepts, and why it is important )] TJ ET BT 61.016 597.859 Td /F4 9.0 Tf [(to develop digital literacy skills.)] TJ ET BT 61.016 577.870 Td /F1 9.0 Tf [(What is computer literacy?)] TJ ET BT 61.016 557.881 Td /F4 9.0 Tf [(Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill )] TJ ET BT 61.016 546.892 Td /F4 9.0 Tf [(levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer )] TJ ET BT 61.016 535.903 Td /F4 9.0 Tf [(literate havethe ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to )] TJ ET BT 61.016 524.914 Td /F4 9.0 Tf [(access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it )] TJ ET BT 61.016 513.925 Td /F4 9.0 Tf [(possible to do your job.)] TJ ET BT 61.016 493.936 Td /F1 9.0 Tf [(What is digital literacy?)] TJ ET BT 61.016 473.947 Td /F4 9.0 Tf [(Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. )] TJ ET BT 61.016 462.958 Td /F4 9.0 Tf [(Its about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate )] TJ ET BT 61.016 451.969 Td /F4 9.0 Tf [(information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around )] TJ ET BT 61.016 440.980 Td /F4 9.0 Tf [(the world.)] TJ ET BT 61.016 420.991 Td /F1 9.0 Tf [(Why is digital literacy important?)] TJ ET BT 61.016 401.002 Td /F4 9.0 Tf [(Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in )] TJ ET BT 61.016 390.013 Td /F4 9.0 Tf [(helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles )] TJ ET BT 61.016 379.024 Td /F4 9.0 Tf [(online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities )] TJ ET BT 61.016 368.035 Td /F4 9.0 Tf [(that are accessible online.)] TJ ET 0.153 0.153 0.153 RG 85.866 350.862 m 85.866 351.275 85.696 351.685 85.404 351.976 c 85.113 352.268 84.703 352.437 84.291 352.437 c 83.878 352.437 83.469 352.268 83.177 351.976 c 82.885 351.685 82.716 351.275 82.716 350.862 c 82.716 350.450 82.885 350.040 83.177 349.749 c 83.469 349.457 83.878 349.287 84.291 349.287 c 84.703 349.287 85.113 349.457 85.404 349.749 c 85.696 350.040 85.866 350.450 85.866 350.862 c f BT 91.016 348.046 Td /F1 9.0 Tf [(Efficient Communication:)] TJ ET BT 202.526 348.046 Td /F4 9.0 Tf [(Digital literacy improves communication that creates a more efficient workflow. It )] TJ ET BT 91.016 337.057 Td /F4 9.0 Tf [(allows employees to communicate with each other through various platforms, such as email, instant messaging, )] TJ ET BT 91.016 326.068 Td /F4 9.0 Tf [(video conferencing, and social media.)] TJ ET 85.866 317.895 m 85.866 318.308 85.696 318.718 85.404 319.009 c 85.113 319.301 84.703 319.470 84.291 319.470 c 83.878 319.470 83.469 319.301 83.177 319.009 c 82.885 318.718 82.716 318.308 82.716 317.895 c 82.716 317.483 82.885 317.073 83.177 316.782 c 83.469 316.490 83.878 316.320 84.291 316.320 c 84.703 316.320 85.113 316.490 85.404 316.782 c 85.696 317.073 85.866 317.483 85.866 317.895 c f BT 91.016 315.079 Td /F1 9.0 Tf [(Enhances Problem-Solving Skills:)] TJ ET BT 239.066 315.079 Td /F4 9.0 Tf [(With digital literacy, employees can access vast amounts of information )] TJ ET BT 91.016 304.090 Td /F4 9.0 Tf [(through the internet, which allows them to research solutions to complex problems, find relevant data, and make )] TJ ET BT 91.016 293.101 Td /F4 9.0 Tf [(informed decisions.)] TJ ET 85.866 284.928 m 85.866 285.341 85.696 285.751 85.404 286.042 c 85.113 286.334 84.703 286.503 84.291 286.503 c 83.878 286.503 83.469 286.334 83.177 286.042 c 82.885 285.751 82.716 285.341 82.716 284.928 c 82.716 284.516 82.885 284.106 83.177 283.815 c 83.469 283.523 83.878 283.353 84.291 283.353 c 84.703 283.353 85.113 283.523 85.404 283.815 c 85.696 284.106 85.866 284.516 85.866 284.928 c f BT 91.016 282.112 Td /F1 9.0 Tf [(Increases Efficiency:)] TJ ET BT 180.557 282.112 Td /F4 9.0 Tf [( Digital tools such as automation, online collaboration platforms, and project management )] TJ ET BT 91.016 271.123 Td /F4 9.0 Tf [(software can increase efficiency in the workplace.)] TJ ET 85.866 262.950 m 85.866 263.363 85.696 263.773 85.404 264.064 c 85.113 264.356 84.703 264.525 84.291 264.525 c 83.878 264.525 83.469 264.356 83.177 264.064 c 82.885 263.773 82.716 263.363 82.716 262.950 c 82.716 262.538 82.885 262.128 83.177 261.837 c 83.469 261.545 83.878 261.375 84.291 261.375 c 84.703 261.375 85.113 261.545 85.404 261.837 c 85.696 262.128 85.866 262.538 85.866 262.950 c f BT 91.016 260.134 Td /F1 9.0 Tf [(Improves Creativity:)] TJ ET BT 180.044 260.134 Td /F4 9.0 Tf [(Digital literacy can also foster creativity in employees by providing access to various digital )] TJ ET BT 91.016 249.145 Td /F4 9.0 Tf [(tools that can unleash their creative potential and produce high-quality content.)] TJ ET 85.866 240.972 m 85.866 241.385 85.696 241.795 85.404 242.086 c 85.113 242.378 84.703 242.547 84.291 242.547 c 83.878 242.547 83.469 242.378 83.177 242.086 c 82.885 241.795 82.716 241.385 82.716 240.972 c 82.716 240.560 82.885 240.150 83.177 239.859 c 83.469 239.567 83.878 239.397 84.291 239.397 c 84.703 239.397 85.113 239.567 85.404 239.859 c 85.696 240.150 85.866 240.560 85.866 240.972 c f BT 91.016 238.156 Td /F1 9.0 Tf [(Better Time Management:)] TJ ET BT 203.534 238.156 Td /F4 9.0 Tf [(Digital literacy can help employees manage their time more effectively.)] TJ ET 85.866 229.983 m 85.866 230.396 85.696 230.806 85.404 231.097 c 85.113 231.389 84.703 231.558 84.291 231.558 c 83.878 231.558 83.469 231.389 83.177 231.097 c 82.885 230.806 82.716 230.396 82.716 229.983 c 82.716 229.571 82.885 229.161 83.177 228.870 c 83.469 228.578 83.878 228.408 84.291 228.408 c 84.703 228.408 85.113 228.578 85.404 228.870 c 85.696 229.161 85.866 229.571 85.866 229.983 c f BT 91.016 227.167 Td /F1 9.0 Tf [(Online Security:)] TJ ET BT 162.539 227.167 Td /F4 9.0 Tf [(Digital literacy skills help individuals understand the importance of securing their online )] TJ ET BT 91.016 216.178 Td /F4 9.0 Tf [(information and the potential risks of cyber-attacks.)] TJ ET 85.866 208.005 m 85.866 208.418 85.696 208.828 85.404 209.119 c 85.113 209.411 84.703 209.580 84.291 209.580 c 83.878 209.580 83.469 209.411 83.177 209.119 c 82.885 208.828 82.716 208.418 82.716 208.005 c 82.716 207.593 82.885 207.183 83.177 206.892 c 83.469 206.600 83.878 206.430 84.291 206.430 c 84.703 206.430 85.113 206.600 85.404 206.892 c 85.696 207.183 85.866 207.593 85.866 208.005 c f BT 91.016 205.189 Td /F1 9.0 Tf [(Artificial Intelligence \(AI\):)] TJ ET BT 202.040 205.189 Td /F4 9.0 Tf [(Digital literacy skills are crucial for leveraging AIs benefits.)] TJ ET 85.866 197.016 m 85.866 197.429 85.696 197.839 85.404 198.130 c 85.113 198.422 84.703 198.591 84.291 198.591 c 83.878 198.591 83.469 198.422 83.177 198.130 c 82.885 197.839 82.716 197.429 82.716 197.016 c 82.716 196.604 82.885 196.194 83.177 195.903 c 83.469 195.611 83.878 195.441 84.291 195.441 c 84.703 195.441 85.113 195.611 85.404 195.903 c 85.696 196.194 85.866 196.604 85.866 197.016 c f BT 91.016 194.200 Td /F1 9.0 Tf [(Big Data:)] TJ ET BT 133.019 194.200 Td /F4 9.0 Tf [(Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data )] TJ ET BT 91.016 183.211 Td /F4 9.0 Tf [(effectively.)] TJ ET 85.866 175.038 m 85.866 175.451 85.696 175.861 85.404 176.152 c 85.113 176.444 84.703 176.613 84.291 176.613 c 83.878 176.613 83.469 176.444 83.177 176.152 c 82.885 175.861 82.716 175.451 82.716 175.038 c 82.716 174.626 82.885 174.216 83.177 173.925 c 83.469 173.633 83.878 173.463 84.291 173.463 c 84.703 173.463 85.113 173.633 85.404 173.925 c 85.696 174.216 85.866 174.626 85.866 175.038 c f BT 91.016 172.222 Td /F1 9.0 Tf [(Social Media:)] TJ ET BT 151.037 172.222 Td /F4 9.0 Tf [(Digital literacy skills are essential for using social media safely and responsibly. It enables )] TJ ET BT 91.016 161.233 Td /F4 9.0 Tf [(individuals to identify potential risks associated with social media.)] TJ ET BT 61.016 141.244 Td /F1 9.0 Tf [(Start your digital literacy pathway)] TJ ET BT 61.016 121.255 Td /F4 9.0 Tf [(With the )] TJ ET 0.373 0.169 0.255 rg BT 96.530 121.255 Td /F4 9.0 Tf [(Microsoft Digital Literacy)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 96.530 120.104 m 194.549 120.104 l S 0.153 0.153 0.153 rg BT 194.549 121.255 Td /F4 9.0 Tf [( classes, you can gain skills needed to effectively explore the internet.)] TJ ET BT 61.016 101.266 Td /F1 9.0 Tf [(Sources:)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 96.5297 120.4228 194.5487 129.5803 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.microsoft.com/en-us/digital-literacy) >> endobj 14 0 obj << /Type /Page /Parent 3 0 R /Annots [ 16 0 R ] /Contents 15 0 R >> endobj 15 0 obj << /Length 1050 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 611.800 521.469 146.184 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 611.800 m 566.734 611.800 l 565.984 612.550 l 46.016 612.550 l f 566.734 757.984 m 566.734 611.800 l 565.984 612.550 l 565.984 757.984 l f 45.266 757.984 m 45.266 611.800 l 46.016 612.550 l 46.016 757.984 l f 61.016 627.550 m 550.984 627.550 l 550.984 628.300 l 61.016 628.300 l f 0.153 0.153 0.153 rg BT 61.016 740.193 Td /F2 9.0 Tf [(YOTTABYTE)] TJ ET BT 61.016 720.204 Td /F2 9.0 Tf [(LinkedIn)] TJ ET BT 61.016 700.215 Td /F2 9.0 Tf [(Microsoft)] TJ ET BT 61.016 680.226 Td /F2 9.0 Tf [(Futurelab)] TJ ET 0.373 0.169 0.255 rg BT 61.016 660.237 Td /F4 9.0 Tf [(SU IT Digital Literacy in a nutshell)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 659.086 m 196.061 659.086 l S 0.400 0.400 0.400 rg BT 61.016 641.748 Td /F2 9.0 Tf [(Posted in:General,News,Security,Tips,Training | | With 0 comments)] TJ ET endstream endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 659.4046 196.0607 668.5621 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/files/2023/06/SU-IT-Digital-Literacy.pdf) >> endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000561 00000 n 0000010678 00000 n 0000010790 00000 n 0000010905 00000 n 0000011025 00000 n 0000011133 00000 n 0000011260 00000 n 0000011360 00000 n 0000011444 00000 n 0000012547 00000 n 0000012674 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 12793 %%EOF General « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

New IT head puts spotlight on cybersecurity at Stellenbosch University

Monday, October 24th, 2022

Paper sheet with cybersecurity plan concept written on it

About six years ago, when Dr Denisha Jairam-Owthar was working as Chief Information Officer for the City of Johannesburg, the city was subjected to a massive cyber-attack which brought the organisation to a grinding halt. Hackers got into the city’s network and demanded money. The metro – the biggest in South Africa – had to switch to disaster recovery mode and all systems had to be shut down.

“That was when I experienced, first hand, the magnitude of a cyber-attack on this scale,” Dr Jairam-Owthar said.  

“When this sort of attack happens, the whole technical team faces a mammoth, urgent task. You have to look at every single system and find out where the vulnerability was. While you’re doing all this, you must ensure the organisation can continue to operate. This must all happen in parallel. There is no level of tracking or planning on paper that can prepare you for that day.”

At the time of the cyber-attack, Dr Jairam-Owthar had a four-month-old son. But that didn’t stop her from joining her team in working a gruelling 90 hours a week. “My staff and I brought sleeping bags so that we could sleep at the office, working shifts, sleeping for three or four hours at a time, manning our nerve centre to technically unravel this cyber-attack.” Her baby became sick from not seeing his mum, and the paediatrician asked what was happening at home. She explained that she was dealing with a crisis – and had no option but to soldier on.

Fast forward to today – and, as Stellenbosch University’s Chief Director: Information Technology Division, Dr Jairam-Owthar is always, on high alert for cyber-attacks on the campus. “Cybersecurity is one of those things that keeps me awake at night,” she said.

In an extensive interview, Dr Jairam-Owthar (39), who took up the position in January this year, was reassuring that SU is in safe hands. But with risks always at play, she stressed that cybersecurity should be “everybody’s business” on campus.

“Cybersecurity is a hot topic, because it is becoming increasingly prevalent. We see cyber-attacks on prominent organisations on a daily basis. They might have all the controls in place, but it just takes that one vulnerability to probe the weakness to come through – and before you know it, the entire network has been permeated.  It is not a matter of if a cyber-attack is going to happen … it’s a matter of when,” she said.

“CIOs have no option but to ensure that their cybersecurity systems are well resourced and resilient. The cost impacts on organisations and on society as a whole can be very difficult to come back from. Every CIO must be ready for when this happens and know how to respond – on a technical level, and on other levels, like how the institution deals with the situation.”

Dr Jairam-Owthar said the Covid-19-driven switch to digital acceleration has contributed hugely to the growth in cybercrime. “So many people suddenly found themselves working from home and depending on digital platforms. Cyber criminals quickly understood they could exploit this situation. Hackers are also highly aware that, in developing economies, many institutions do not update and upgrade their technology and infrastructure, and that’s where the vulnerability sits. These very intelligent hackers know we are challenged with funding, to keep up with technology. This is why countries in Africa become targets.”

Moving to why cybersecurity is so important for SU, she said: “This is an institution of real excellence in academics and research. We have researchers across many faculties, and there is so much research data in the system. Ethics in research is so critical. You cannot release the data unless you have followed all the processes. It is absolutely vital to ensure that the data, network and our online systems is well secured.

“On top of this, the system contains a great deal of students’ personal information – their exam marks, certificates and their whole student life cycle information. This could all be affected in a cyber-attack. When an attack happens, the reputation of the entire university comes into question, and those who fund research could become sceptical.

“I have to be able to say to my bosses at SU, hand on heart, that I’ve done everything I can to protect all our systems, network and information.”

Giving strong reassurance that SU is in safe hands,  Dr Jairam-Owthar said cybersecurity was high on her agenda when she joined the university in January. “With the support of the university’s leadership, we did an assessment of where we stand.  It found that we are well within the industry norm but there’s a lot more to do because, when it comes to cybersecurity, we are faced with a moving target. We cannot be static or complacent about it. So while we are fine in terms of the industry norm, we have to always drive to improve. The most critical challenge for CIOs is to keep up with this moving target of cybersecurity.

“We do have our controls in place as a university, but … even if we put in excellent controls; someone in Amsterdam for example can find a vulnerability. We have to be on the pulse, staying ahead of the target – because it is moving all the time.”

Dr Jairam-Owthar said there is also the issue of balancing costs. “Our partnerships with our vendors, such as Microsoft, become critical. We have to consistently ensure our vendors deliver value. The skill lies in balancing shrinking budgets with moving targets and higher expectations of technology.”

When she was at the City of Johannesburg, Dr Jairam-Owthar played a key role in the institution’s IT Digital Transformation. Passionate about education, she believes her role at SU is to enable education through technology at SU, because IT is a ‘critical enabler’ in the transformation of education”.

“The impact of what we do is to enable students and staff to be educated. That is the part that speaks to me as a person. Education holds a place in my heart.”

Dr Jairam-Owthar said the university recently did an analysis using the National Information Security Technology (NIST) cybersecurity framework.

“The NIST is a tool which does a full analysis of the entire IT environment and where the weaknesses lie, and how to prioritise to close the gap. That report has been done, and we are engaging on it in terms of priority and the budget to start implementing it to strengthen our controls and security,” she said.

Turning back to the incident at the City of Johannesburg, Dr Jairam-Owthar said it was “like walking through fire”.

“It’s like having an intruder in your home, and you are standing in the house and you don’t know which door the intruder came in. I never want anyone to go through that again. I wouldn’t wish it on anyone. We need to be well prepared.”

Asked what her main message to SU students and staff is when it comes to cybersecurity, she said:

“My main message is that cybersecurity is everyone’s responsibility, not just that of the IT Division. Everyone on campus – staff and students – need to play their role. To stress the importance of this, we will soon launch our cybersecurity training aimed at strengthening our human firewall which is the staff and students. Everyone on the campus, must do their bit to strengthen this human firewall.

“SU has such excellence in academia and research. Let’s work together to find the gaps and strengthen the systems. It’s the simple things like don’t share your passwords, make sure you authenticate when you get on the network, don’t go to sites that look odd; being able identify a phishing email. Check with us if you are not sure. If you get an email that doesn’t sound right, talk to us and we will guide you. Most cyber-attacks come through the human firewall. We cannot work in silos for cybersecurity either. We need a holistic approach for SU for cybersecurity. Lastly, make sure you do the training, it will empower you on what to look out for.”

When Dr Jairam-Owthar looks at her son, now a healthy, happy hi-tech six-year-old, she sees a boy who “handles a phone, an Ipad and a computer all at once”.

“It is for this generation that we need to bring the university into the digital fourth industrial revolution.

“I say to my IT staff that; our primary stakeholders are the 33 000 students and the 3500 staff of this university. I want to know what our primary stakeholders look for in technology so we can meet their demands in a safe and secure way, where we are also implementing a key principle of ‘security by design’ on any technologies we implement”.

Image credit: Formatoriginalphotos

Something’s Phishy…

Monday, October 24th, 2022

 

Internet down Sunday morning

Friday, February 25th, 2022

Due to critical maintenance by TENET, our internet service provider, internet services will be down on Sunday, 27 February from 00:00 am to 03:00 am.

During these three hours there will be no access to the internet. We apologise for the inconvenience. Any enquiries can be logged on servicedesk.sun.ac.za.

Important dates

Tuesday, November 30th, 2021

DELIVERIES:

Last day for deliveries (2021) from suppliers to Information Technology: 21st of December 2021

First day of deliveries (2022) from suppliers to Information Technology: 11th January 2022.

COLLECTIONS:

Last day for collection (2021) from Information Technology  by clients or departments:  23th  December 2021 at 12:00

First day for collection (2022) from Information Technology by clients or departments: 5th January 2022

Before you leave

Tuesday, November 30th, 2021

The December holiday is almost here and especially this year, we’re all looking forward to escaping for a week or two. But before you leave, there are a few things you can do now to ensure that your return is seamless. Here are a few tips: 

  1. Activate your Out of Office function on your sun.ac.za Outlook mailbox and indicate in the message when you will be available again in case someone needs to contact you. Also, indicate who will be responsible during your time away and add their email address to your Out of Office.
  2. Make sure that your relevant work-related data is accessible for usage by your colleagues while you are away. However, do NOT give your password to colleagues when as this poses a security risk.
  3. If your sun password might expire during your holiday, rather change it before you go. If it expires while you are away you will be locked out of your account and it will cause unnecessary stress to deactivate it in January. 
  4. If you receive a phishing email on your sun account over the holiday and clicked on links or typed in your username and password, your account may be compromised. Immediately change your password at www.sun.ac.za/password and log a service request on the ICT Partner Portal. Your device will then be checked and scanned after the holiday. Remember that you can also report spam directly to Microsoft by using the handy Report Message function in Outlook.
  5. Information Technology will also be closing, like the rest of the University, on 24 December and opening again on 3 January. If possible, please log your IT requests as soon as possible before you leave. If you have a critical problem, it might be difficult to assist you a day before you leave or on the last Friday since suppliers also close over the festive season.
 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.