%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 39 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20211201061640+00'00') /ModDate (D:20211201061640+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R 35 0 R 37 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10602 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 147.904 521.469 598.830 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 148.279 520.719 598.080 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(WHY IS CYBER SECURITY IMPORTANT?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(the practice of guaranteeing confidentiality, integrity, and availability of information.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(someone elses system. Knowing how to protect the information that you have stored is of high importance not just for an )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(individual but for an organisation and those in it.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(Did you know that:)] TJ ET 0.400 0.400 0.400 RG 85.866 462.926 m 85.866 463.339 85.696 463.748 85.404 464.040 c 85.113 464.332 84.703 464.501 84.291 464.501 c 83.878 464.501 83.469 464.332 83.177 464.040 c 82.885 463.748 82.716 463.339 82.716 462.926 c 82.716 462.514 82.885 462.104 83.177 461.813 c 83.469 461.521 83.878 461.351 84.291 461.351 c 84.703 461.351 85.113 461.521 85.404 461.813 c 85.696 462.104 85.866 462.514 85.866 462.926 c f BT 91.016 460.110 Td /F3 9.0 Tf [(As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2)] TJ ET 85.866 451.937 m 85.866 452.350 85.696 452.759 85.404 453.051 c 85.113 453.343 84.703 453.512 84.291 453.512 c 83.878 453.512 83.469 453.343 83.177 453.051 c 82.885 452.759 82.716 452.350 82.716 451.937 c 82.716 451.525 82.885 451.115 83.177 450.824 c 83.469 450.532 83.878 450.362 84.291 450.362 c 84.703 450.362 85.113 450.532 85.404 450.824 c 85.696 451.115 85.866 451.525 85.866 451.937 c f BT 91.016 449.121 Td /F3 9.0 Tf [(43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began)] TJ ET BT 61.016 429.132 Td /F3 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 429.132 Td /F3 9.0 Tf [(here)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 214.592 427.981 m 232.601 427.981 l S 0.400 0.400 0.400 rg BT 232.601 429.132 Td /F3 9.0 Tf [(.)] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(The US government's Cybersecurity and Infrastructure Security )] TJ ET BT 61.016 398.154 Td /F3 9.0 Tf [(Agency has made a collection of tip sheets available for use. )] TJ ET BT 61.016 387.165 Td /F3 9.0 Tf [(These downloadable PDF documents contain all the information )] TJ ET BT 61.016 376.176 Td /F3 9.0 Tf [(you need to protect yourself from cyber security risks in a )] TJ ET BT 61.016 365.187 Td /F3 9.0 Tf [(convenient, compact format.)] TJ ET 0.400 0.400 0.400 RG 85.866 348.014 m 85.866 348.427 85.696 348.836 85.404 349.128 c 85.113 349.420 84.703 349.589 84.291 349.589 c 83.878 349.589 83.469 349.420 83.177 349.128 c 82.885 348.836 82.716 348.427 82.716 348.014 c 82.716 347.602 82.885 347.192 83.177 346.901 c 83.469 346.609 83.878 346.439 84.291 346.439 c 84.703 346.439 85.113 346.609 85.404 346.901 c 85.696 347.192 85.866 347.602 85.866 348.014 c f 0.373 0.169 0.255 rg BT 91.016 345.198 Td /F3 9.0 Tf [(Cyber security starts with you)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 344.047 m 208.547 344.047 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 337.025 m 85.866 337.438 85.696 337.847 85.404 338.139 c 85.113 338.431 84.703 338.600 84.291 338.600 c 83.878 338.600 83.469 338.431 83.177 338.139 c 82.885 337.847 82.716 337.438 82.716 337.025 c 82.716 336.613 82.885 336.203 83.177 335.912 c 83.469 335.620 83.878 335.450 84.291 335.450 c 84.703 335.450 85.113 335.620 85.404 335.912 c 85.696 336.203 85.866 336.613 85.866 337.025 c f 0.373 0.169 0.255 rg BT 91.016 334.209 Td /F3 9.0 Tf [(Creating strong passwords)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 333.058 m 198.053 333.058 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 326.036 m 85.866 326.449 85.696 326.858 85.404 327.150 c 85.113 327.442 84.703 327.611 84.291 327.611 c 83.878 327.611 83.469 327.442 83.177 327.150 c 82.885 326.858 82.716 326.449 82.716 326.036 c 82.716 325.624 82.885 325.214 83.177 324.923 c 83.469 324.631 83.878 324.461 84.291 324.461 c 84.703 324.461 85.113 324.631 85.404 324.923 c 85.696 325.214 85.866 325.624 85.866 326.036 c f 0.373 0.169 0.255 rg BT 91.016 323.220 Td /F3 9.0 Tf [(Cyber security at the office)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 322.069 m 197.558 322.069 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 315.047 m 85.866 315.460 85.696 315.869 85.404 316.161 c 85.113 316.453 84.703 316.622 84.291 316.622 c 83.878 316.622 83.469 316.453 83.177 316.161 c 82.885 315.869 82.716 315.460 82.716 315.047 c 82.716 314.635 82.885 314.225 83.177 313.934 c 83.469 313.642 83.878 313.472 84.291 313.472 c 84.703 313.472 85.113 313.642 85.404 313.934 c 85.696 314.225 85.866 314.635 85.866 315.047 c f 0.373 0.169 0.255 rg BT 91.016 312.231 Td /F3 9.0 Tf [(Identity theft and internet scams)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 311.080 m 218.582 311.080 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 304.058 m 85.866 304.471 85.696 304.880 85.404 305.172 c 85.113 305.464 84.703 305.633 84.291 305.633 c 83.878 305.633 83.469 305.464 83.177 305.172 c 82.885 304.880 82.716 304.471 82.716 304.058 c 82.716 303.646 82.885 303.236 83.177 302.945 c 83.469 302.653 83.878 302.483 84.291 302.483 c 84.703 302.483 85.113 302.653 85.404 302.945 c 85.696 303.236 85.866 303.646 85.866 304.058 c f 0.373 0.169 0.255 rg BT 91.016 301.242 Td /F3 9.0 Tf [(MFA \(Multi-factor authentication\))] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 300.091 m 221.552 300.091 l S 0.400 0.400 0.400 rg BT 91.016 290.253 Td /F3 9.0 Tf [(Also read more on MFA for Stellenbosch University staff )] TJ ET BT 91.016 279.264 Td /F3 9.0 Tf [(and students )] TJ ET 0.373 0.169 0.255 rg BT 145.052 279.264 Td /F3 9.0 Tf [(on our blog)] TJ ET 0.18 w 0 J [ ] 0 d 145.052 278.113 m 190.079 278.113 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 271.091 m 85.866 271.504 85.696 271.913 85.404 272.205 c 85.113 272.497 84.703 272.666 84.291 272.666 c 83.878 272.666 83.469 272.497 83.177 272.205 c 82.885 271.913 82.716 271.504 82.716 271.091 c 82.716 270.679 82.885 270.269 83.177 269.978 c 83.469 269.686 83.878 269.516 84.291 269.516 c 84.703 269.516 85.113 269.686 85.404 269.978 c 85.696 270.269 85.866 270.679 85.866 271.091 c f 0.373 0.169 0.255 rg BT 91.016 268.275 Td /F3 9.0 Tf [(Online privacy)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 267.124 m 148.031 267.124 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 260.102 m 85.866 260.515 85.696 260.924 85.404 261.216 c 85.113 261.508 84.703 261.677 84.291 261.677 c 83.878 261.677 83.469 261.508 83.177 261.216 c 82.885 260.924 82.716 260.515 82.716 260.102 c 82.716 259.690 82.885 259.280 83.177 258.989 c 83.469 258.697 83.878 258.527 84.291 258.527 c 84.703 258.527 85.113 258.697 85.404 258.989 c 85.696 259.280 85.866 259.690 85.866 260.102 c f 0.373 0.169 0.255 rg BT 91.016 257.286 Td /F3 9.0 Tf [(Phishing and spoofing)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 256.135 m 179.567 256.135 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 249.113 m 85.866 249.526 85.696 249.935 85.404 250.227 c 85.113 250.519 84.703 250.688 84.291 250.688 c 83.878 250.688 83.469 250.519 83.177 250.227 c 82.885 249.935 82.716 249.526 82.716 249.113 c 82.716 248.701 82.885 248.291 83.177 248.000 c 83.469 247.708 83.878 247.538 84.291 247.538 c 84.703 247.538 85.113 247.708 85.404 248.000 c 85.696 248.291 85.866 248.701 85.866 249.113 c f 0.373 0.169 0.255 rg BT 91.016 246.297 Td /F3 9.0 Tf [(Protecting your digital home)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 245.146 m 202.562 245.146 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 238.124 m 85.866 238.537 85.696 238.946 85.404 239.238 c 85.113 239.530 84.703 239.699 84.291 239.699 c 83.878 239.699 83.469 239.530 83.177 239.238 c 82.885 238.946 82.716 238.537 82.716 238.124 c 82.716 237.712 82.885 237.302 83.177 237.011 c 83.469 236.719 83.878 236.549 84.291 236.549 c 84.703 236.549 85.113 236.719 85.404 237.011 c 85.696 237.302 85.866 237.712 85.866 238.124 c f 0.373 0.169 0.255 rg BT 91.016 235.308 Td /F3 9.0 Tf [(Cyber safety on social media)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 234.157 m 206.558 234.157 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 227.135 m 85.866 227.548 85.696 227.957 85.404 228.249 c 85.113 228.541 84.703 228.710 84.291 228.710 c 83.878 228.710 83.469 228.541 83.177 228.249 c 82.885 227.957 82.716 227.548 82.716 227.135 c 82.716 226.723 82.885 226.313 83.177 226.022 c 83.469 225.730 83.878 225.560 84.291 225.560 c 84.703 225.560 85.113 225.730 85.404 226.022 c 85.696 226.313 85.866 226.723 85.866 227.135 c f 0.373 0.169 0.255 rg BT 91.016 224.319 Td /F3 9.0 Tf [(Cyber security while travelling)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 223.168 m 210.041 223.168 l S 0.400 0.400 0.400 rg BT 61.016 204.330 Td /F3 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 204.330 Td /F3 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 214.592 203.179 m 232.601 203.179 l S 0.400 0.400 0.400 rg BT 232.601 204.330 Td /F3 9.0 Tf [(.)] TJ ET BT 190.354 184.341 Td /F3 9.0 Tf [([SOURCE: )] TJ ET 0.373 0.169 0.255 rg BT 238.864 184.341 Td /F3 9.0 Tf [(Cybersecurity and Infrastructure Security Agency, United States Government)] TJ ET 0.18 w 0 J [ ] 0 d 238.864 183.190 m 545.485 183.190 l S 0.400 0.400 0.400 rg BT 545.485 184.341 Td /F3 9.0 Tf [(\))] TJ ET BT 61.016 165.852 Td /F3 9.0 Tf [(Posted in:News,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET q 225.000 0 0 126.000 325.984 291.934 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 428.2996 232.6007 437.4571 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 344.3656 208.5467 353.5231 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecurity_starts_with_you.pdf) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 333.3766 198.0527 342.5341 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/creating_passwords.pdf) >> endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 322.3876 197.5577 331.5451 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecure_at_work.pdf) >> endobj 19 0 obj << /Type /Annot /Subtype /Link /A 20 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 311.3986 218.5817 320.5561 ] >> endobj 20 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/identity_theft_and_internet_scams.pdf) >> endobj 21 0 obj << /Type /Annot /Subtype /Link /A 22 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 300.4096 221.5517 309.5671 ] >> endobj 22 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/mfa.pdf) >> endobj 23 0 obj << /Type /Annot /Subtype /Link /A 24 0 R /Border [0 0 0] /H /I /Rect [ 145.0517 278.4316 190.0787 287.5891 ] >> endobj 24 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/05/what-is-mfa/) >> endobj 25 0 obj << /Type /Annot /Subtype /Link /A 26 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 267.4426 148.0307 276.6001 ] >> endobj 26 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/online_privacy.pdf) >> endobj 27 0 obj << /Type /Annot /Subtype /Link /A 28 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 256.4536 179.5667 265.6111 ] >> endobj 28 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/phishing.pdf) >> endobj 29 0 obj << /Type /Annot /Subtype /Link /A 30 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 245.4646 202.5617 254.6221 ] >> endobj 30 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/protecting_digital_home.pdf) >> endobj 31 0 obj << /Type /Annot /Subtype /Link /A 32 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 234.4756 206.5577 243.6331 ] >> endobj 32 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/social_media.pdf) >> endobj 33 0 obj << /Type /Annot /Subtype /Link /A 34 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 223.4866 210.0407 232.6441 ] >> endobj 34 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/travel.pdf) >> endobj 35 0 obj << /Type /Annot /Subtype /Link /A 36 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 203.4976 232.6007 212.6551 ] >> endobj 36 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 37 0 obj << /Type /Annot /Subtype /Link /A 38 0 R /Border [0 0 0] /H /I /Rect [ 238.8643 183.5086 545.4853 192.6661 ] >> endobj 38 0 obj << /Type /Action /S /URI /URI (https://www.cisa.gov/publication/cybersecurity-awareness-month-publications) >> endobj 39 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 168 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 10916>> stream JFIF,,ExifMM*i2 &0000 t2017:06:02 14:57:042017:06:02 14:57:04 }http://ns.adobe.com/xap/1.0/ 2017-06-02T14:57:042017-06-22T11:50:16 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N  1!AQ"aq2B$345DRS#6TbsUdr#Q!12"3R ?{+ol3xKJRqh +M_$[\ sHU9a/oe1E%Zed,<xA[rcr9.[ؖ(qwDy N }/xdmrXx'࠱9x@/B ZOYaE1j[q_p"2㌔EK ;]5ے/ , wX>pa؋%Kn1`p*vNB0B pf8Q[XV)3)hJm;7v(h^#L%dm]A(:5(B=0߹7U:TzJqR۫m*6rT$Q.LJM'u5GX*2Z&(2d{DRwX06:rqF.X܍4jTw#|ԫM/<x2\$ԕp /࠹  ;JNMAQ &KeDJa "mtGnlbB8J7=e6<JPN=loiWKls5)ʤWU(^Sv7NeMcV#}65Һj}R\3QKM4oSkQ)]C~ i|C~ii^כW9gLkCwsK1 rUZJ\`¹DގS/1%Iʍ]8' d馻%k&!QY{vlSjNR5'tӨўawKohFG3)}|)*ݵ0><#zgViMSSpJMCGPB8ԧ+56WT%?Ihxcv4usI*miQ{>nğV-r$+' tJķ垵FMF=Isr*j'Q{4,թpRVmljU%_=tF*?Aw/ 2PXf+#`;2#k|[`g-V*z:Y)Qٞ}h΅WJyy,dqS~ÚzΗ$f:k4Mll^$ﵱY=~r&ZZ=:n5u?)1Gj3vo O~%i?ittcGOJ4FxHj~?k(/wXz,xw$RZ_o\YmO>MTZ3rTՔDmԔQk9,pQI5ksr, v!;$s LH/rȹ_l# fx["cQPA ؂=o|6ҬNJNOk͖/ ؕ߫wmlS )h ݚg{Ay??>Ln26af7o?~X] o?,}-~P~uƟ/UcN?y,yV.UtiߧShk?'˔=­TWJV O 3L~4 ߺ?,~[Oqjվqax;ŵ~;^ Μ)FKO=ӓ;|>&O]NPK_?/?yuhu4/ꩨ^K'Ŏxɍ+-ĖrdVf&<:.qvv-՟NB1g6cT9;=!Ν pU Xӻ!o>`!l"dU8aaN>`y({)b^@9!~/"þHEj#wquhY:r~uR7=EH8uҋ[eFjNrr?hw.[qWٞO'B~enJFm/iv*tE9)7M^m4Vk;<ܲ+ 6ҳ}NWrn=,Ct9ISk؛UgWEfzҊZjGI] s;]{ؖ{aB䂯GX}c]%{J.>.[$[0!HT jTn;x o@΄z[XяTcGW>+;aRN5a\r@6ʌ\RHTu'=b݉E  @Xaa_UUN6dR_b_b,ֵriԹo'&Jhf,0as(0> startxref 26255 %%EOF Security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Security

Why is MFA essential?

Tuesday, November 30th, 2021

Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor authentication (MFA) is one. 

Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven’t, we ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need MFA authentication are the Microsoft365 applications. These include Outlook and Teams.

A guide on how to register is available at the bottom of this article and everything you need to know about MFA at Stellenbosch University can be found on our service catalogue.

WHAT IS MULTI-FACTOR AUTHENTICATION (MFA)?

Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data.  

Specifically, it enhances the security of your UserID by using your phone, tablet or other device to verify your identity when you attempt to access Stellenbosch University’s network and resources.  

It takes two items to access and update your information: “something you know” (e.g. your password) and “something you have” (e.g. your phone). For example, when you visit an ATM, one authentication factor is the ATM card you use to start the transaction – that’s the “something you have.” Next, you enter a PIN, which is the “something you know.” Without both these factors, your authentication will fail.  

WHY DO I NEED TO USE MFA?  

Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means information online is increasingly vulnerable. You might not even know who else has your password and is accessing your accounts.  

In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University’s financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now has your login details and can access everything you can access – including, potentially, bank details. In this way HR systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if someone has usernames and passwords. 

We must take steps to ensure that we are more than just a single click away from having our pay check stolen or becoming a victim of identity theft.  

Multi-Factor Authentication adds a second layer of security to your account to ensure that your account stays safe, even if someone else knows your password. This second factor of authentication is separate and independent from the UserID and password step — MFA never uses or even sees your password. 

HOW DO I REGISTER FOR MFA?

You can register for MFA by following the steps in this guide.

Read more on MFA: 

MFA FAQ’s

Back to basics: Multi-factor authentication (MFA)

What is Multi-factor authentication? And why is it important?

Video on MFA by tech expert Tom Scott.

Phishing scam from compromised university account

Tuesday, November 23rd, 2021

Please keep an eye out for an e-mail from a sun email address with the subject line of FYI_Order/Approval. 

It is a phishing scam with a link to a website that is designed to compromise security and steal details such as banking details, login names and passwords. 

The owner of the affected account has already put an Out-of-office notification on her account telling people to ignore the mail sent from her account, but the account is probably still compromised and under the control of the scammers.

Once in the university domain the scammers will continue to attack the university network to steal more information or to obtain bank account details, etc.

Here is an example of one of the mails:

 

Please report this phishing mail if you receive it from the above mentioned address or any other sun address. Here is how you report it:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Go to https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115.​​

Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​ Please add the suspicious email as an attachment to the request.

​​~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If you have accidentally clicked on the link and already given any personal details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm and change your password immediately.) Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts. Contact the IT Service Desk if you are still unsure. 

[ARTICLE BY DAVID WILES]

Upgrade to Office 365 and Windows 10

Wednesday, November 3rd, 2021

Microsoft recently sent out a notification that some versions of Office 2013 and Office 2016 may experience connectivity issues due to the retirement of support for these versions. It is therefore imperative that all users who still use  Office 2013 and Office 2016 immediately upgrade their Office software to Office 365. 

Users whose devices are still using Windows XP, Windows 7 and Windows 8 as operating systems are also required to urgently upgrade their devices as this software is no longer supported by Microsoft.

Benefits of upgrading your software

With the challenges we’ve faced over the few months, why do we have to sacrifice valuable time to have my software upgraded?

New malware is released daily, putting your data and the University at risk.  So, apart from gaining new features by updating your software you are also protected from outsider threats as the new software has better security features, is more reliable and has better performance. 

When must I do this?

We recommend that users do this upgrade as soon as possible to ensure that you don’t fall prey to malware and lose valuable data.

Who will help me with the upgrade?

A support ticket can be logged on the ICT Partner Portal.  As soon as the ticket is logged, you will receive a reference number via email after which an IT technician will contact you to arrange an appointment to assess if an upgrade is possible on the device.

[Article by Ronel Reynecke]

­­­­­­­­­­­­­­­­­­­­­­­

Information Security Awareness Training

Tuesday, October 5th, 2021

Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.

So why would a university be targeted?

Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.

Consequences and why it matters:

Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.

A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.

In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.

To access the course, go to https://learn.sun.ac.za. When the SUNLearn main page opens, click on the “Information Security Awareness Training” link and log in with your network username and password. If you’re successfully logged in, scroll down and click on the “Enrol me” button to enrol yourself for the course and to access the training material.

If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via https://learnhelp.sun.ac.za for SUNLearn support.

 

 

 

 

 

Why is cyber security important?

Tuesday, October 5th, 2021

Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.

Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.

Did you know that:

  • As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2
  • 43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began

More tips and resources can be found here

The US government’s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format. 

More tips and resources can be found here

[SOURCE:  Cybersecurity and Infrastructure Security Agency, United States Government

 

© 2013-2021 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.