%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 24 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20211204133826+00'00') /ModDate (D:20211204133826+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4006 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 229.849 521.469 516.885 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 230.224 520.719 516.135 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(REMEMBER TO CHECK YOUR JUNK EMAIL FOLDER)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(To ensure that staff and students )] TJ ET BT 195.098 564.033 Td /F4 9.0 Tf [(aren't)] TJ ET BT 219.245 564.033 Td /F3 9.0 Tf [( exposed to malicious )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(phishing or spam emails our system administrators and security )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(team)] TJ ET 0.373 0.169 0.255 rg BT 81.023 542.055 Td /F3 9.0 Tf [( had to enable a stricter spam filter earlier this year as added )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 81.023 540.904 m 325.130 540.904 l S BT 61.016 531.066 Td /F3 9.0 Tf [(protection.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 529.915 m 103.037 529.915 l S 0.400 0.400 0.400 rg BT 61.016 511.077 Td /F3 9.0 Tf [(A spam filter assigns every message, received and sent, a spam )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(confidence level based on the likelihood that the message is )] TJ ET BT 61.016 489.099 Td /F3 9.0 Tf [(spam. Depending on its level an inbound message may be )] TJ ET BT 61.016 478.110 Td /F3 9.0 Tf [(relayed directly to the user's Junk Email folder. The filter looks at )] TJ ET BT 61.016 467.121 Td /F3 9.0 Tf [(certain criteria contained in the email it rates, for example too )] TJ ET BT 61.016 456.132 Td /F3 9.0 Tf [(many hyperlinks or a suspicious file attached. Tweaking the filter )] TJ ET BT 61.016 445.143 Td /F3 9.0 Tf [(can be tricky we don't want you to miss important emails, but at )] TJ ET BT 61.016 434.154 Td /F3 9.0 Tf [(the same time it's our responsibility to protect you and all our staff )] TJ ET BT 61.016 423.165 Td /F3 9.0 Tf [(from harmful attacks.)] TJ ET BT 61.016 403.176 Td /F3 9.0 Tf [(For this reason, it's important that you regularly look in your Junk )] TJ ET BT 61.016 392.187 Td /F3 9.0 Tf [(Email folder in case the spam filter might have relayed it there.)] TJ ET BT 61.016 372.198 Td /F3 9.0 Tf [(The main purpose of Microsoft Outlook's Junk Email Filter helps )] TJ ET BT 61.016 361.209 Td /F3 9.0 Tf [(is to reduce unwanted email messages in your Inbox. Junk email, )] TJ ET BT 61.016 350.220 Td /F3 9.0 Tf [(also known as spam, is moved by the filter away to the Junk )] TJ ET BT 61.016 339.231 Td /F3 9.0 Tf [(Email folder. This is done at an institutional level by Microsoft \(as )] TJ ET BT 61.016 328.242 Td /F3 9.0 Tf [(mentioned above\), but you can also flag or "un"flag messages from a person or company as Junk email.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 308.253 Td /F3 9.0 Tf [(How to change your spam filter's preferences.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 307.102 m 243.806 307.102 l S BT 61.016 297.264 Td /F3 9.0 Tf [(How to tag an email as junk mail.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 296.113 m 193.064 296.113 l S BT 61.016 286.275 Td /F3 9.0 Tf [(How to report spam or junk email to Microsoft.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 285.124 m 244.571 285.124 l S 0.400 0.400 0.400 rg BT 244.571 286.275 Td /F3 9.0 Tf [( \(downloadable PDF-document\))] TJ ET BT 61.016 266.286 Td /F3 9.0 Tf [(If you have any questions, please log a request on the )] TJ ET 0.373 0.169 0.255 rg BT 279.149 266.286 Td /F3 9.0 Tf [(ICT Partner Portal.)] TJ ET 0.18 w 0 J [ ] 0 d 279.149 265.135 m 354.173 265.135 l S 0.400 0.400 0.400 rg BT 61.016 247.797 Td /F3 9.0 Tf [(Posted in:E-mail,Notices,Tips | | With 0 comments)] TJ ET q 225.000 0 0 225.000 325.984 347.824 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 81.0227 541.2226 325.1297 550.3801 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/03/additional-microsoft-security-for-email-activated/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 530.2336 103.0367 539.3911 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/03/additional-microsoft-security-for-email-activated/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 307.4206 243.8057 316.5781 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://support.office.com/en-us/article/changing-the-level-of-protection-e89c12d8-9d61-4320-8c57-d982c8d52f6b) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 296.4316 193.0637 305.5891 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://support.office.com/en-us/article/Video-Block-unwanted-mail-a3cda7e7-03ab-4188-9a9c-0f05e6a41e75) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 285.4426 244.5707 294.6001 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/Infoteg/dokumente/Report_junkmail.pdf) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 279.1487 265.4536 354.1727 274.6111 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://servicedesk.sun.ac.za) >> endobj 24 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 7855>> stream JFIF,,ExifMM*C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,,"D !1A"Qaq2#5BRs6Sbr$&34Cc%t&!12AQ"qBRa ?R uh֏YdQ-n_m;.n=ܜ޾nSܠJ|wo>>\s""" """ """ """ """ """ """ ""lm.{Z7O8]4 k}_ϑ\󹐎]^|w;˓a;Xأ52Tc'wWUW i]^\ӇX;RmI$dv|A.0N,?hQUhnP&p98v.wSPm  0= e.վB Â`m)H[n]-7iBhh׌HAa""  }(mq={Ldw3Eh|22@-;;i_$m :[rg{=DYnr=z>>pb-SI%GuGzH+t)sv䪵Mq뺥|6@1 y^V;VQ\&tC2n޸#D#cgymZ.ofN\Ρ舢 7kUU+jOՖg85j-SHc8j^kE5C.Cp+׏ {xg'KFm*"#LָM#z|wp˭OS0!`$eVg<8`,)bX#کlOwtUH99/}ڗHh'MYz8LNw}ӗVԉCd/0v6+< 17 z*[ ܲtjM-TSs(+TGmF2؞`>^2v5kzK`{OY!\;LѷzlV&|{r״z"" """ """ """ "" 4 wS$AU ɤ2j}ўQ2=U霰{|6oY%N+89s$`8{ F|=+oNmNY*qN$˩.R~0)|k"cV>{Wu:_+UGUoa|' 2'ѹq.=5TOԒHl=jG[y:YQT6hGrmx>ʋ9iV<';_*gtދ?@K5猁汤XB湱C\Cs[xgn]1ßʴ/!Y \=; #o[ZUNJ3?=dעQFO #WMpvGaM*K6pd#q,VЏP>17.GxYp .,o<2+>Sn3\$X]SbU>J`bqf|qZ[P6#亂nϸ%c;41rFZ?==ߧf9VΘaT;cje!ɤJR^kM=:ݹMSqQ8pk9]XsNViI;f>7-xAue\ !ܶՂwseD@DDD@DDD@DDD@DD' VJm_.]|c/uY[\VҵQ 2(enq )M9;עq a SاsbWBbwt`.e%+g'g8' mU;?u)㥘:6y`YE|쬵2UO3'i9AgM/4 ښڗ"zK/ uqϓWӝhU$ c8ȎoSBa׶)$O q-WbS6\e彎P~BYmx7v]J 3[]AR%,;Р)Y4m9,A|oX'Y*˷߬|ۇ8sVeik+aXYUKG,w|zIvwQm穾x_XYn|H e7]acw? h=mM/8 nc yFFFOOj*_OSjM2ZN;mC$isCe}$drV3Gu;>+o_BRr@^GS8y(o|3SA΀Okn"+EEepa-c#أE$,hVwn\ї=0twS!&*inc' Ĩ+U. K 8d|qy1ӻ9f 26}MB7d/CjX੊ccËO5{XZᐩ@Whsw;{+\*3A ¬lP+P=m}{WYūg d$,H[2}{&'{Z0ҷ]XnT4Յ敷A+= ({iKVxUiBAxޭT10 G&gf?pߊFhGZ;VZOw5 ̢%20pwhzJttYVyܝ]=m#\;8fslVy2ϭ50tUc:9YcprF-+ LYJdF7 j2tR\঑DE|nY6x*|G* QǗ[k,w'淐!TF"AX_ڿZ҃Nbg?ڷi^iAn:F!U` 1GeoҚQ?S#끓Ug%U7Bxv+/i*ne|s7R@DDD@DDEoFlj]1_|G.kjϪ\wngrbG.gN+{{M-qi*x^al{{ji[4҃VҶiM(5M+'ap0ѡTfѼ+5*ژIJ=n8$0gX^B0Z*'޴E%E_"GwI%["4$-P+49ӿpxNț6+3] ˧ '\)i?F<_#˱k`ع96 DGj|۴ Ճ{`V]y:c-k7q }e h- )8p] gE}$qSkm*c-SCd\זU5[jKG";8ߐ\aS=f!JTf 8\+鄄apQ@DDD@QFIQFY/q;cۧ^A(=2hRjCopH^jMH0>_HZgw͟/۩_u4ӳ=*eO?H1zm録&wg|BũlmOkUt]H mO\*=I#WXaKn"zr[eªԲUkKDEpIy^9rwÆu8gJVC<xqw%j\;i(1<9mSč< 滷nf%U&|'I Oh_eKxwZA_p).T ,+tNTiH۫dtSAt_8$;qV]XpwqU 6Fzi{0>Čjh*cT:Va) Jm:6wY%r,<+~m=ƲeE۪Inv|aUj&Tgfc\={Z2I]rMJebL"퉄dxjSP|=hqX)(D`d-`1 6i {\BHZkMW; {Or6ݟ{-x\I|t4=LL`!7-ݽbv,I38Ij6vj*Y4o.S2Zqi]<텾:1miݻyNВ"T,SNl-o(Q4d5r(~(m6֌9,PDDD@^ajrZsObܮn dQK++ƌq5Ti*{i5 ))"xx-s{W^Ol ੗UAr tgO wLrO,Y^ 0V(gVշ3vpW^zG?9A׫;T#dݞ* > startxref 14709 %%EOF Notices « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Notices

Goodbye from Attie, Hello to Denisha

Thursday, December 2nd, 2021

With my nearing retirement at the end of December, it is time to say goodbye to my valued colleagues. How quickly the years passed! After seven years, it is time for change and renewed energy.

Some of the highlights of my short sprint are:

  • The introduction of process formalisation in IT service management, resulting in the institutional use of the Jira Service Management platform. My sincere gratitude and congratulations to Nobi, Marc-Allen, Courtney, Malanie, Ronel, Leanne and many more colleagues who helped to turn it into a success.
  • The retirement of Inetkey, and the abundant availability of Internet capacity.
  • The establishment of maturing service practices in the IT Division, like architecture, security, project and service management.
  • The structural reorganisation of the IT Division to enable service continuity, portfolio management with increased focus on academic support, business systems renewal and service management.
  • Infrastructure modernisation in the campus networks and building refurbishment, especially the Extended Learning Spaces project with state-of-the-art audio-visual technologies; and finally,
  • ensuring business continuity with systems and technology during the COVID period (2020-2021).

Thank you for all your support and the stimulating challenges, especially my directors for their loyal support. I wish you all a thriving work environment, and success in all your endeavours!

My successor, Dr Denisha Jairam-Owthar, will be joining you in January 2022 as Chief Director of Information Technology. I have full confidence in her abilities, and believe that SU will benefit greatly from her leadership.

Important dates

Tuesday, November 30th, 2021

DELIVERIES:

Last day for deliveries (2021) from suppliers to Information Technology: 21st of December 2021

First day of deliveries (2022) from suppliers to Information Technology: 11th January 2022.

COLLECTIONS:

Last day for collection (2021) from Information Technology  by clients or departments:  23th  December 2021 at 12:00

First day for collection (2022) from Information Technology by clients or departments: 5th January 2022

Why is MFA essential?

Tuesday, November 30th, 2021

Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor authentication (MFA) is one. 

Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven’t, we ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need MFA authentication are the Microsoft365 applications. These include Outlook and Teams.

A guide on how to register is available at the bottom of this article and everything you need to know about MFA at Stellenbosch University can be found on our service catalogue.

WHAT IS MULTI-FACTOR AUTHENTICATION (MFA)?

Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data.  

Specifically, it enhances the security of your UserID by using your phone, tablet or other device to verify your identity when you attempt to access Stellenbosch University’s network and resources.  

It takes two items to access and update your information: “something you know” (e.g. your password) and “something you have” (e.g. your phone). For example, when you visit an ATM, one authentication factor is the ATM card you use to start the transaction – that’s the “something you have.” Next, you enter a PIN, which is the “something you know.” Without both these factors, your authentication will fail.  

WHY DO I NEED TO USE MFA?  

Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means information online is increasingly vulnerable. You might not even know who else has your password and is accessing your accounts.  

In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University’s financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now has your login details and can access everything you can access – including, potentially, bank details. In this way HR systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if someone has usernames and passwords. 

We must take steps to ensure that we are more than just a single click away from having our pay check stolen or becoming a victim of identity theft.  

Multi-Factor Authentication adds a second layer of security to your account to ensure that your account stays safe, even if someone else knows your password. This second factor of authentication is separate and independent from the UserID and password step — MFA never uses or even sees your password. 

HOW DO I REGISTER FOR MFA?

You can register for MFA by following the steps in this guide.

Read more on MFA: 

MFA FAQ’s

Back to basics: Multi-factor authentication (MFA)

What is Multi-factor authentication? And why is it important?

Video on MFA by tech expert Tom Scott.

Makerspace at the library

Tuesday, November 30th, 2021

The Stellenbosch University Library Makerspace is a vibrant, user-centred facility enhanced by technology to elevate learning and digital literacy at Stellenbosch University. There are bookable design & construction workstations where patrons will have access to equipment and services such as:

  • 3D Printing and Scanning
  • AutoDesk software
  • Arduino UNO and Raspberry Pi
  • Soldering stations
  • Oscilloscopes
  • Dremel & hand tools

Where:

Upper floor, Stellenbosch University Library

Make a reservation:

https://sun.ac.za.libcal.com/reserve/Makerspace

https://libguides.sun.ac.za/makerspace

 

sun-e-HR system not available

Tuesday, November 30th, 2021

Please take note that as a result of critical system upgrades and maintenance, the sun-e-HR system will not be available from Thursday 16:30, 15 December 2021 to Monday 08:00, 20 December 2021.

Should you have any queries, please contact Wessel Nolte.

 

© 2013-2021 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.