%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 15 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250713052823+00'00') /ModDate (D:20250713052823+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 2724 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 77.876 521.469 668.858 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 77.876 l 565.984 77.876 l 565.984 745.984 l f 45.266 746.734 m 45.266 77.876 l 46.016 77.876 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(PHISHING SCAM SENT FROM COMPROMISED GOV.ZA ACCOUNT)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(David Wiles)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Please be aware of the following phishing e-mail which is now starting to be sent to university accounts and might be )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(thought to be legitimate especially if the department has dealings with the Gauteng Government.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(The Subject of the mail is Payment Notification and asks its victims to click on a link to VIEW PROOF OF PAYMENT.)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(Firstly the link is not a gov.za website and government departments do not usually send out e-mails asking you to click on )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(unverified links.)] TJ ET q 478.500 0 0 340.500 61.016 223.766 cm /I1 Do Q BT 61.016 205.975 Td /F4 9.0 Tf [()] TJ ET BT 61.016 185.986 Td /F4 9.0 Tf [(The suspicious mail takes you to a site that asks you to download a file. This file has a encoded script \(malware\) that looks )] TJ ET BT 61.016 174.997 Td /F4 9.0 Tf [(like an ordinary web page that asks you to enter your username,password and your cell number to confirm your details )] TJ ET BT 61.016 164.008 Td /F4 9.0 Tf [(and allow you to view the encrypted PDF file. Of course this malware, now sitting on your PC sends your login details )] TJ ET BT 61.016 153.019 Td /F4 9.0 Tf [(and password to another server overseas controlled by the scammers, which they will)] TJ ET BT 61.016 142.030 Td /F4 9.0 Tf [(then use to break into your account at the university in order to do all sorts of nasty things.)] TJ ET BT 61.016 122.041 Td /F4 9.0 Tf [(So please be very careful, especially in the light of the compromised university accounts that were used earlier this week )] TJ ET BT 61.016 111.052 Td /F4 9.0 Tf [(to launch a phishing attack from within the university.)] TJ ET BT 61.016 91.063 Td /F4 9.0 Tf [(The university is now a very popular target for phishers because they can easily gain access to personnel and student )] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 223.7659 539.5157 564.2659 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2019/07/gov.jpg) >> endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 805 /Height 573 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 103193>> stream JFIF``C     C   =%" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?񍦤ɩ9-O6oau;)Z;隷|A٭ޥe}}ճoχw?g:_ +dKyf;ox/Lyupx0̑/|?WG5?eO{),O֝俓l/zls[ۖh[}'$O3 9=VY^h&O5^ݮp[[ o=0澜O ^7ln-/?$}G7(߾c:9火!dy&Tn]OýbXk;˾{m?Kuʴ)}YR U8hhhh@995hh99Phh@995hh99Phi jjI.}wJI{\rPӕKwOI^gKĶyMoTKOY[xu.5/ieDDa>I̥89~x-!kn&O9>O?=X? >kXe乙-H.atޟq;֨^}Ng4s]|g7.ѥe??|O?vgWcr˄>}zp^rS0"D~fz$) ) s͏Q'{OmaTio!CBɿ{?}w G&k!5-6ea5wpȐ&sO0҇?8K9N79.go:KR3lޓo}uV:=֫q4V~wdޞK~OQr>_NO75I%6ikil^,4l\i~|.C_9|2ko/vHo":y?Mg$Mf&HmwMo}jIup}E>F]ι}ПPԴ]Rkgc-.||1ֶHuZ ]{HvEH?y4ֽSKwk m 3 ?')q4sG4sFhh@995K[;jȟiAI=lo&&*4{ZKhܪKK?o2V"EQjo|Oy>{"MqƇP`Ӧ]%r׭=/myZ"Mgya'{ O'y(SC:sfƟkxBKMeX&z-gzMåkR~3yXĩyQΏ~:"jBO=_-[˹z59ͱHڊ ƞz~5xzNivcgY!K7cw[xjVВb<7h W԰G''7ӣtuL(+%I|?~~ڟOĶLK4?eGtMxK+uΌ> P&+cy*]-cm3&+Qϟ$/ S}h۷M_Wüt]W?ռ|'XfW 릏pW|z{T gO&M6{ mocFsb2LKV[%[Ks+mɂGPsAg^}cj_ҙ{ Ӥ{ҙQS=LÚ99Q4sG4sFsG4sG4jѨÚ99Q4sG4sFGhu/"\WG߮yфZp:;>״Zkܥ; ůxQũ^:L/3߳GmƏxZ5#8Ujr挏HIE$[,tn^GG}&O*^-&f?Ζм(}pZYJ'/!^w sUMY"[\t#74>K;ܪ3|G6!K;5lLO]kO@i}ϭ?C-.k'&LO%6I}[ԖCqg| \}>9@#>3l࿹{Y!}otseY6jп4/Ly}I}Dn9 3G.]BKy4"yo%󿿿mS4ݥ5¸h揩A}z'ԯ'cK(~tyO^'ж&?Ɖg">מG5j|p&~ oYi\Yh \&7Mӭ~:k0Z^[});+o6=ZjZ[!nYΛ}fϿl\ncQ4]C^|L+G?epgK/us EoGc}ޏlYhW/sCtޫiȆ5ߙoȕу]Tu#HPoQ?J5vz4[};W֊$Y;;<9pG![n995hh99Phh@995hh99Phh@995 犿f?e7Y7ީp77/纙PsK+S?i㐜m995sZ^/״tu;KTAy2"7_4)ӅO>[F.e4PG4sN 4'He39P:D:lxhh 5j@sG5CcX zIΎ?nj?U[7X}jUu|:t(l,m$o4/9Z'S|mE]{X淃Bw4w?DD߳j ^I?}{PXY:&}˼{";;'ܯi{R9B\dy4s]+Щo"V-W[lE{?ZZ}ɽyu߇=\x~O/Q}R/f9>wx{+tNmYX]-P?״OgדR&o:1>~*9Y^,R;qXYu? ͦӬm繺RClWI {QQ_=Cer&t l}]mͼ=ɳcO7Z?3dܮyW]G8Ϗ:}ŎEMy^mq? =Zg"Oq?^| [ {hițM>O;_eAZĉ8D<;k>ү/%/7O4oFsj?QG˷޽9_Hi5+ߴ;fS-s~2os=s? 3&?_;oد3~?(VOK9n,!ӭu6;J?:xYҼ+麌e߲gM}s!8fIDf:};E-t@'穭QN|j7բu?~iv ۮsa}"']|#ɧ^M%iM?+o |AiO=t/%Q-fâx?c)F17RsWğ -7-/ÉkOlrM?Xoc;JM.%:Ooy_sOE}M?~o?)Uy=F4S6`# ׶YC`>؞Of⏇6#N\MhwufٿR'mqXx YHf-v:'ȉ|U!֮1[SeV?tү??@Ӕcb:PZ5{KHcg>fW{E^Iy<"?Sß ҮtҼN},vL~F׭='ZR?ܭaR|hΝ>_vz;ߤy }2$)GWd opS s5Yi{wO>O$IV>/en4Os&~Jj4Tǫ[O}>zɾgmԭ {o'}#Y<9GHwy>JF}c=ƙ즛3Zms*x~˕{߹7TsWt76pI 6;6W5χik6yqZCo Mr]4:GBi~)K(|ʞMyy\]lD~}B>wXrR28igfzoO16S6]]s2=ׇCt&}|UW>.*-KT%`st?[Bٿ?[Mo֨8_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>[{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*k-T?>_{9T[7G+Щo"Pp9hV-S[lE[Bٿ>C繣[Mo·o f(Cko5Q ſ*-T?>_lZڇ+z&hdΰ2 ERSjic[L 3Ϸ1J|WO\|`gtzgi]ͮ6lТ{C6_?^?9 PCd?u'5ʻ&ևh&mr!{Zw\%Ŭɽ's{GRy.~sҾcu~>0Jԝ5o^|eIǢ\қx/~غOS7WiZUa >E)#߾DHM:qJk+Ş :Lek|n6o:&ϟ~wrZG},?ߩVU3cxMJ4[M-_x~gv>~c\--قUlX @ < sP I/l&x&DwMu?~)h,oocoW }xu6="M6w2?.ɩ}}z)>}$o|-^+v;oxX[}2Anm]N'}:#?˲ |r!]m-5+kٵ}wGb|}N|?e(/?煏\eK{PӴ顳ti@|/ڹ[X -lm&v3A}rǪ ?Ey|tՍ->> 뫔?;H|>.\s~k$coWQEaʻuxC[9mὼu=9e_l1̥+ugmyom7ګHblttٳY ~%wUXW:֭Ys%)r9D}߼j^1"S>$zo|A<,->coW_xTT5+-K4.&}w<} |w$WV@ХqRGdGt0vSv_*w_e(/?煏^OuKZmwrKye5c,ϳwJm@j}Y5s_l] Iҋ]L/?煏G|A<,-K[=rO-n߾t!|>;j7Pe}.DwG}]*z|A<,->coT^U׌>5[8chH&#f;F]maʻ|A<,->%Ɵ˻}uܢ9WcھKvS݇{}cI%/ɿ <.]*]WmW>tۍ>!?:]D}+M)c'>J|G,m)?4MO3?RxMU)K7ZITI6%rHί9Ś ܥٱO߭ 7Y[]Dcwq9i{zL[M4M#Z>sy oC}h4?bxw&D}BtЯ<7Ge{x{_loET9jxn#^dys|slH<}+Fuv|Uj>}>\߬/|EKq 6q>Mvh%L֠z#M%țg hU^4Kf;o 2ғ/֒1"M&$T=WV5#M~sy[RZl}ߣ>}+fOxڥInl л+{#v,Y5?5Sb[T]A,Z3|k|?k$ kO ^Oz֗/ x h,Z6|iwOXPǚʫFrZk-.4DD?MB4KgDDw+lo^е]mվ߲dT6os 'ȟ]q֭m^dSya=[f7?:qxi-֫1 Дm77&u^ubfkk;o:&|7?]rQjuwpZJJV}cޥl`7?o;G^L6m hQly?aʻMy.eCj{C9Wbמj쪮~鑇Fj|KkE#DDwwwoZזxohTv:6+n_cN4cau#6op[>ˋ[^}|W3R5=k[TH`0#1B}IDK|~؉lRyē\OƧy/ih{[m_X.xe9x^ XeԵ(dzm6O ĺu-*/f:Mcam+(!M^Qc[W㶣hYk?ͪ}ŹIy4(U9KMͱޝA' /Qvgo5$"^ie>wyRs_|Z>)]|[Ӽ;QOC7L-KxYbu>F}e `5??hsiȑv=~mh)DIi\g-Ibc"L]}-ْM߼c2 ?j{c;'z՗Wgrş9yG4]v?9h拰]ov9j)wrvO/~H]6w^oF}":|rZoZ9i(^XbO%7+U$)]75"uk KZY__gm e&>TdX_'?]6[hU Ͻ6#Zt{=rڅ]'|<Pӕ{etÿmWVVY_ė4(݄u/A&N9-?g};ɭh.h_i Յ^7D4b B?UԦKK[wG+%`Ӿ/2lKXvo'?g?>ힿqq,^^wP;C2]j<'[ռmuܼ{;q}ޭI}Gwʇ{n[_% B!Ro؟e'[C޵}y6+Z6[56l/շ'3xFZ?Kt],o?o^:=uc> y|Uճo%yɾ#Oxy I|Tٽ~/49t j1i睲Q &}}g?Ï_߈,=[.do7ñ7O?W4yy=ySI7_w.Iu6  ,J}Z2{u~3|?icr0q(G۳]}J[=j{lP2¸iz3B-]#ȏ=t׋<;{qGrs=Οs >JG7"JCBԓ @$_7.?_B\iֳ&:fK* t*C'W\s~ZVX%ϛ(缏HDzƑKhۿ|(q=KoM7ȕ쉱yտůkz0ZF-mo\p~OU񯍮5 8 jo25OoFy:5޾k%܈ W G,]#nU^^FvΛo5w5k#XТ8.4Y/w{j;fº5Ez]ý?7Wt6JKk;x`NB[ᮧsXwpӴ:o1EP\7u ~:"ii Hm+5~uкR  6ϛ~½+Ý?ᇄ{>|뫩>z䱷y%v2O{OhmX,1$?x>3|Gu{}+;[n<F cۭM+V-uj5㽪$&}ɦM%O>M>Zk}"&K8-Z jԼQmNc 4]Q2"l{=sZt/;k+ȼ+уBec|x]}vmCWkEVK +#]Eoܭo׿PգMޞ[$?lDHa/ɿ <.z<WxoF'?k\R+]\1=[O>k[뷹DtYNt:LO|iOM?\o4}<-tGtGGٽ%v}{<| X%eގ%t2~?jѦI0jO}jϿQ8jp[,4yzF_ k/t}ܮw"<+&RN3M~<jdžI4k߲DOg5Z9NTҟ,z?4s_?|Dh'Kmbr𽷝'}+cRj$tto}߹77Ϲ^{O4s^qBVyx>KW9ܫ/K}?IḺ{'@׎h?S7 mu$>͟?z6uGFo}h0.K*{CuR=oį,\Wicp.aDޛ}?+<(<[}kIHl,btfD=z5|FxKv$}}@/n-}CwNllCm J\?_i$א?zr5,l<7HyR9?Ի :<i|QsS[}MOk8~oߠͺc7qx:JXO-pG% ȓWIx}sTUtM.@w{*5?$: ׺>ȹOtnI?uc[>X|?T{ggOו>&o?/u/^DmF?})fÚo{+UK+@ZܥݕoxB+~~n JGءw2w޶$JC⏄0>ĝwÞ'V P94y!zqV_V]qV__O hhOۻO޿VQw/ڊ+'qfsS#__K`K? h/GBN"?moxzHKRo[%}6=y':J',x-f:|7M}+|D%)`)*^iB\̼wH`y?'c]_;? Vel=(˞EZ~|>.j۷ZxFCxa&x`woޛU?h }[4/N<;if>^c7ԣ<UcKgk_i<۠X=k)Zjt(CSK?lx~Dޟ;+z Я=?[?7c-|7@Ozl+GҼ+a=Ml-SbP__^I%oh݅ir"CX{.'czݯD/=7Vy{'߾yǩ$T')SL.'Oپߪ.$/n,tDoy/&i"W_?>.ZZ5͵[&%?Y#m?b[Ld}ea7߆״-J[7{|tO+Ͼ;xY>MS\yWt]ח6KmodtޛgkXkm3Bui[ aDf!q7 jm/FcKGGn]_I>k!46ޗ('=pZ-W滟\~m^/}?rv;K{?ZVcg Z)-C"%̛>y>t6_t,STGMl(v'M4H&$̈Ktw?|=4OKih~ll||GG&y3C>Ͼdqހ<[Y&7vc&ԑv=ٝfDw'+k}cĚb֭u(a&I> ;mޓlZi p["#T6Zi6;Xv#MhVwv$03oOWYB"ly:6ګŬ\^^Cy{|vD!{M"~tܢќEW2eyI7_w|kmF==/}6o\h7_1!E?$[ˋH;aM/N>]|]kK-=><׶7펫n5{[YCo}bJ&kW֛_ax6̦ďOƜGn:;"OA7?K5ͺ|^E KTi~uw[o|;b&Ҩi5J+=IlROTr&D}ϿPAcnvm/zZ-[XlvGD xSnYvM4.ay>OVmkXWQm漸tDM/7?v|[GeIM߰G>!媦v5|cs_{8.To?UDEDfPk7]+WF{p)i@DQE\~ɡgky-VAs7ْ%?ޛkX,MiU^[}~X`=[hnxMN:|?9Y֟-LR u;ǎ#ϒٰ}V=M :>KI?=Fs8xU4kil5(<0C2$.^>!eDGtGtG}Z+mcƽk]j}]<3}a~J՛֯k{$ѢMr-n|D1lQ}|UK?8nbwwVdoQ>kWqa/kO=6]g RY_vji3'QMEaT ,x5ſYHbɭOAቼC'f{͏y?[fow%>/~:^bX6CfQ"M6/Hv}͟U /:tO og~΍w̉}?h6:c )m [&D7_1}YXx{LkkWMOPc]YoH/!x_cb]&[.MĖW03'2oGXMG&^hh%yGį|H4bӬ>YK7kJoɮGP6|?Ώnۯ RM6]IKי/~o~7StjZD%uCCg}7@*?MɬI䶺3wtGea䴛6;V kM:$DvlG}}\FKcY\iul .YS:s愉$߿Gm\뿿묾ao߿˺7~x↱BK_̉j?x{:OC>&h}2 <ٱ6|T+h8 NM*I-ydIl?۪/TX|ZC"q7|l.ͺk8#u“Z7ƟǍEu_6~m4ֶ2oH]q?~cӢ[KbGw͈l;tx+⇆I,,{xQ#H_[C'9XRd>)QJviV1Ofs{|13AΗ/|&I?G_XxCU~){gYk%qoĶ2L΂k] %iUM7=ox/菨^][5 ?ϾRg!4mcOܼ J<)k{tbR?P%.hlo\\kU5 *[>NM}ߩ4 ҴM2{s%;<nI-mNxfok +ٺƥ}]M CgȈoislxf&7Ɵh>6|Cj]^. ֏ jߠ _'qWZemkǦ?D޻_'qGx_[,ugu@M%՞gq}Sf^kry^%_gulF:mk5F6ϓ_}}kXPjV& ?fKzC6ohLto$p["lf}, ]m$KëY 7 ϳ>OA\_d,t=7Kd{ {G-Sȇf~*y?!q9kx~Η(bwɿ᢭Oе_i:^O%;czk> xLttM#?uz.>q>K}̒?ٳ͔o{ o5m|_&RdlSj_5_y-=uj[Ma6u~Xt{^PKQf^obVi>kicY[|mC!@ xoͨ]i?7p\ v(̛]=}YQχ4<9acaLwKQ\՗P|w/ڊ?n>z[Q_d4?,|$} Iw gR.w,JWM~u[?L n-76jW_gIH!1#6'>Xk}7v?ddn[k6S __j%>[okyD}W}oF{jqAkrkԙ>"|3d:١dslO*}7U,-o,az7Wl awybTN“Db:oI(yG4xᕛoQз/ \/&+½W~*{SIӞh4}'WG5|@y~eSg|B=@W[Z}CoC}m΁-zˡiJS]%?VdiOVue5އcݟ:|4s@ֵ>5֟oo,)|wZSjW[|#Oo9?dXlGi^&t!_gSDA%wmm˾tV]XԞR{> WnWnc|Tŝ՜W0umΎ?\տeko랸i52*a.O%F6oٳ~ORiV,$~O0&+df,$eOO|~/ة˺?'AoVX}>4owGFڎ(q&o^ WRUںEi_G/@_ 7G@_ 7IojuVPuw o??VykQ;o "A.THgw}<ҺG&OT|AZ_O# V?k\R棱;_'4&Q'?lkşWSKM::y>'H]+h[=0Ÿ4sI'Ύ'G"I$@ v2yw6?G?M6R5-沆-X%ϝ53'햿뮿ȕc3ߎmM.,'}4VɨM7-BAwaO -{O>7}5/96M{ o6&~i<~Ϟ9ۯjZ KD真K/ ^}>OoٲdV=n›Hg(ӿYI۾O'~?C+/4Z̛cqz=q_O iIA:ۼ&&Do9!;-Hlܼ?^d7J﹣/ÞԬYIϒi7Tw tbUkw3zOslvq GYo.-_w7WW>vą>?MiUKUtYj7ߎ ޭXǷ :;e`W6 /3j7rMd~*Fs< }}c)xDK'RD!"@x^%wGHvMf?bVC2lo&GI?۠ :kĻyb&D?~)W5_bI\_C<3gNgzG #4sPXVڕͼ"\“C?&龀$栓B*hI>:OA\_d/|Gqq;OowJ~p^Z\=oM~<¿ mAM7H tJ2MM'r?-六y ݭoxԗe?4sG4s@4sO RkyxIG?n>z[QG_+j+ƟgO䏠~ȟ,u;}/ˆlm~B{DMt<mIo A&t+đNP9i7Z,LBMReΈf~Q< uotlf.^ió*U i?+#u []ϲ2oD[^g>-/[e AkrΈfG߿+*U i?(}ѽ?nfϼ3?@#w}~ޟ_~c< /,/1wz}|R}xA| ޟ_gv)gV8Oxa]iE>mI/^x&>GO!chc< coOP|iyg߭ϳTca ޟ_k?G,/1wz}|Q  ]ޟ_~c< /,/1wz}ʹx?m??9^/(R}(ż]Ȋ]&#}Kx&6lGۦdEGi]jy1υO6W?`O~zxI;ɦA ϿɶM'%z>uO6@}ѽ?m}}(|P.toO[_`x>c>?}-?_/PtoO[`O_\McGl<鲱t+^nsuZI᧶lMow/Rfϼslޟ"lw6}(ʹxiU-_G{|\5ϳ]i}-g OO6}(¬>Ms5Λi^<ךu%aގM7_:=ݵSM6mשfϼٶ@[}ѽ?nfϼٶ@#w}~ޟ_m??O -ޟ_m??O - fDyx|J?m??O z>زH{mw%??G~q 47Cf1L$lr}/i>fϼa}?}m|Qi>?}m|Qi>?ΑOm??O,Ҽ3hkݍsk"~>a+;~?ܯ~ʹx?m??R>gOZKmR,O{owʹx?m??0z}ʹx?m??9 7sg߬iz4,t٬D2=wS:yszoWfϼٶ@1?ËGK}Z<߼{MjQ?C<)ޖs“gwG+oO6}(ξxK}*6A5ϝ p}Gt?'Ro9>Dʹx?m??<դ׵ KDes[<͎>iZզo76legOٶGm|P$"Kx簒gwyə7ޛ)_B KCJp ?M^i>fϼx>zm.M6]#ȵx~r&ϝ^&&fϼٶ@[}ѽ?nfϼٶ@?t?K).4]<]7?ƛ}QW<,z-ˣinc6}(ʹx<s3eHGw E~l:wTu$WkMQ׋_U_?BRRibGתC==uX!?!}k&o'󾾕C>>ִ[XŲz ?C|.J$ǺY^EjE?ܬ_>1Xx}ާJx|Q돾]h%UC}wU*U?2!\zq>4=hǩyYqoU@ ]OPO<z>McG>M7ɡ&Aހ-lS*z;ԒiO@XOUҪS^Jg[mיXᄊ_"4(@oU6W/Tpx} 2J˃GxiO@?PG>ʫ&ӯJ֮Jx+(((((((((((((((((((((|Zoc}q{΋(}v3jM ui;]N]:/16I_o+@v<p[]JRp,fMoKLuBɸ;;f'߿omxM6$ni<6H?|T:7» 'z~76M tWݳc@uZ?zp[ܵ4H;$x e^xoC6izl}oa/ .ZQEхx_LDsg|iZ.m- ~ʯnth.}_c_,RV&1_k&v}eZ?KpȔ>7ZIJ}jxv IռQ6>i0RKօ\̳*nIQxk{BS4ψ7'Z4?fK{/wt6bxSNڝxY4k]$)#g:y)/t#K^\[iK6&V؈]um5᳔_[7~rCUφ|aM!e_ ܤ|s7W+i{ZAUռ?v:BbβwazQCamYj61=vp |cN-7ڎiZDt|/a>-BKW'QY~+)=2to;隕%/r bSG]%ӴmZZK ;q7Ln(xOw]ߣ{O?[ܤ͠71Bfq ^k?*+AVj-x7Ȍ&W?'KؼGs}^CAȉG0[پ"'\1kJ<9o> jkWQFʹW.mϝ?¾SZJ$y GSQH|JO۷>e(!*j(!(!*zQ%MECTJGSҦ!*zQT|JJ>ʞ5q( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (>B?x߿ފ?oNɿ)~Y~HOi| R*<%+qJjw쵉o^wWh~{U7m]el~ݯį|IoVsa?mowJXZQ/C WOН(vo:5 7Z{7~mN'Ჸi^L>skͫFtjʔ*'WNi}>UUB(5(y>Ɓy>vV>ZjK o3~gm7ɚ#_-jBMU<5cc u>y*A7l|b唐CjVWmQv}Ο=tJ9O6oKϠqCa5qzLO̙OB]kf=֖YLw>Dހ=`nwS$ʯ }cq=힕xJoٳٶ>Xq"\ytS$"ۜޏm7JFkZc!co鼴r=zn\e'lY voݵoj|7w ;Q|;>O~~wM 3#]M;O $w1j5B[M";g}nw@_a@uk,ytޠb/KomlY#Gm*HlG`Sz'ZM֚\\;&p@:Ĉʪ(¹=/#I >UF[^-CQqi:MלyI~鿏]۶)*o^Iu/őŢhvjl̈aD#+'υ,-KW."ŽsllFѤHx^ ̆Ϳ;T:AX"$Mc'z%_-+IqeIO%t/.?k-ƞ[Kǜ />ˠ'SBowsD[Zi~7G-*C{#F֟h.o5U?G@EPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEP_GW7?3/ S߄'O2BZ%Hƛ{x^D?7!+ϣr?BG?>O.y3W[v4[hz6g}i1M VΆi"_^ւRr>yH /MkA ަ|}_OG?%3>ͲLy/M]Jz*MҾ}o.Keyytֶv$i4 >}~h| +}F;/aq#-oM,ӜonB|%zj im xuOyQzTv[ūk qMl~yۯQ8?|-ax7Wulڲlxw_UKj:]D2"y I::Z*(wYj\ݿ o,9ԾRlemʓoٞFGЯzέ|q`ϟg|>{xwmb-#ܢٿn (ü?>VMK7&װ׏<0ñ?4w^$aa=R ﯭm㳸DDz|)ֻz(~:&۵?w&~?_Ҳm Ko6}}Ͽ}>z({abkGӟMQco|N4a+6&nw1lk8}'ᕞBxt%("G(AҴuoiid E˦Em۷1'>Ƶa/Dy"ď*~k;OI}*qyy ܲ.KB6n0:0.<cjz[4ottރjֳoti0ۺ6l=l@.?m!khcEEiR9 ϟv4m?cO}ʏt=ކDDQkѨ((((((((((((((((((((((((((((((((((7oæ.]ϿVdQâ_>C_rض!+ J~'oBW`lROH2Eo}x7ߺq~mLn?m76( JOG J>mLn?OwmQo┟n7@ o}x'xa)Icq|R}|PmLn?OwmQo߷>Lg(a)GmR}n36)>Ln?n7/mQo߷>Lg(a)GmS~Lg(w1}xa)Mw1w1(~mLg(a)GmR}ߺ>Ln?/mQo┟m7@ o}x'xa)Icq~o1ta)GmR}ߺ>Ln?/mQo┟n7Cq[ZǾȟߟ{M o}y%VZ 2O#}ʵ'u.⋇#[o6*anZD!Vu7mQo+ãG_OpSwmQo┟n7'ۿ;6( JOo}x'w1}xa)Icq~?Hwga)GmS~Lg)~Ln?_6)>Ln?m76( JOG J>mLn?m76( JOG J>mLn?m76( JOG J>mLn?m76( JOS?a)N[8cmFXNԵKE3#&D}+FZR[{fJ'|~7~ߟ< ooE~SL:O$ 5J#Y\GkEr7_!+]R Xm$)̆5IPNc/ |SQƪu+hau~"  vktWEɻ|mĶWYv_zŅtORMPC î]>J?e?zj׶ r"DD*lϷݳhϳewyuMJi㱀|om%ߥ|Q'c=/OmNudӼ OR~>_Z5A#^{rmЗlϑNvf#";i;Mor$S1ʊ7nW5_vْ6/;_6M/s|9X=zOVMRDqs\V8\rmJRbmLmy7=m熀>ex5K{n3'G_Eybwy{j/ğά3Ѽs:5Ϛ'?1ҺM࿊ac]\w1xMr_~[7z' w7+sxFSoi^iP˝~ME߉{}k6e?ȗ1+ľ&|ďxwwRS c?ۅ+ٯVռ~ Ҽm(+G,IΛwfO利((u c?5>tD>_Tm|q^k8R. ?ᯊu|U=,j<>]y7k}(G7x]m Vg?|;j&\E4.kϑ.xd|B"o}>[mOKԭXԧˎpڗ:宗>$y6Or7gm'g|W?kF^? 꺣i$c67SC#Gqø}ϓ6 ׼E=p^&c $>L/lkFzc/[zi߮OluZbN##޿# Öz3]eg}]rKVNV-.!rJj|YZO-kv5 j:ޏ3׺Ɠ;MgM7lGEAKJv2޿nsw*okĚkPL{?*B]ljӵ}ZjSXjK5>etAM>}ܳF7,u$Wx&Bon:;>D,u_~w[nJt # :,0iץ˗]Yv?%~l7_],yx2o 3[jf<0y6yS*j$]v/ i_iִf5Q>sblru]?/$/l}/i^ˋ;GFaDNߥI4/ċW1v:uκͤ/pXy0g}{OJ Kx>m[KS?_:>McO6zTO! q{c3?bk_?dR+[yٳ;mf͟dٱw}KozZުn rD%nw=o;!DqvE)-/gϾ~ VYUѾVYv~,j:5o6Gv<)&ʾ-m> J~h5ICOl}-eGJPG*Fw5aO ͥAoztz5#?gWCu ,;v4خ}겫W(Rult,f]q^)[uS,4_Id աwI:.0Yii6,m P}~?*zZkޛ}QcGO:(|Q]i:"6ɾt}){:9sFo~(x+M=>N XK,O?Z,~!M7jԿg0ؕ~|?k >/k^( j > ݛ%Jkn7Ko ޱI]nC37>yl~--w^Fb:0d%ANZ#c8U_ț#G4Ve*\ïïv<3i.]/ۣbW}y~Z~*&2Zc.on!h~[ IhmNka2y/xCTo|Jۮ'6>D?G-sX z?o7SѴ 7Nickrvd.KrIӄӣ? ˶_;|Y] 6GJ MJIa]oi_4S=s(1ޱz+WA)gM͆^ev2WZc} {kZCE#2}GvmڤE1IT$ץZ( ( ( ( ( ( ( ( ( ( ( ( (<мWc6^_KtG#ֿm,n +LӴ>X9&S_}(gmYo~z+ŸJgO䏢~'oBWIj.w}{2giO4QoҹI`k/jvXl"<ɽ7c2jG?%ExG^ƒLJ|3:%Zw||mXsM|FG3]|=5ڽxfjYχFHctoyÌl=VjG=~W>>x)~73tr8Y/O5>$Ce#DQ}v=_O |;Ųkf:Zܻ}kO7^+Sx;uK e)\~~ksY!|@wm,tiE域rg*/fח:#\KվO!g5ن}wLYo^gM3F3q|V$W'wgJ-Ʃ4LB!y7#"|^$}!m5-sTK6O:^L韹?_Q$XtiZt(i#7`E^N?$Hm2^I}&%/n/DϏ+k?IĻMB ;qy\" 4X|WuS =Gmszŏ uإduizfBOXXgF~y üvW)|f]ТM#YuI'TN~}'7gB9a.fHO?|x⾅IRӵIKk|#Q2޼Kictk,Tli76im~X/xH69cbG ̈h_`t  h-B6UdgM] OjoxR *T^M3}vw[_F+⋙m\1y#(ي.~&xrI=mF&~!_trWߴw|-n+W_I46I;?W[^ O ~`Nb|鏽\fO!<E]y^'R]7s7拁2xXK[XRi-}g $H.+QmKpxK.`>ADB;w>U5?ǂ~xRŗof#GkhvA>}r_7\\f_F{9ٱɚOg(#kþ8ߋ'Լ/$+~oywO- wRp~U~ M7:ڌWi,.\CI9^F?*hyiTP~Rp~TyiTQvU-SKTxfMz7|Wmud{H~g_*ZW餑x; ۷yį|1 w.h)w?S>/f]^%돇m< @>q]Z'?JΎ_F4 vi[1,O9A޳~,oHǼ3]uJY>iCh'4?3wJu>)\֥-Y,~^'o]R.޺77$z욒}͕_꒳u8q.KƟa|C_>{]v5i߷a2u~̺qokֿſ=gaj?'鿷>$-QkҼW ޗwnUoSw|k}vkŏɑ #I>|=wFip蘅Qy] cye폗p϶/o˷g xG5;]EVOvKƸS[ ~#x[_iڄ& \ۺyw[đ[ b K}7M;G]ÿ5..] Z57.--[UFx™WES_Gcj}|P𾟧ڦ]EzhO7S6Bt[:}i:wBm]\:~S2Ox&OjM7sZZ>\4R\ďdʿiV05,e> MiMWv}Y ilL:q,6[}J>:Ye#>Zghwf9|NgGҕz2< ڸjc_BF/ $:rH^WDlUA_i1g4yk:5k=SĚn 1%] .?7hڅff7ir{󿿷Qj\O/˩QIO~ !մ=+N԰J܉Vo67߯^tXF{"%y{C>;iC$[2o[ Iܭ?^^DK.-!dEfҩUFR3 uݗ.oKm7|>լ-F i}$daMjok핵y!Xy^&|[Ou[9-ƙuئqo.n>uAY%_:Is8e w-lO)6r7[S_ygo4umnd_;\fCFok%-i/JoU'^Ew->r?l mKĖsN}okuOjw彽歪uiHFO>t,׵?/vL&es:wޛnwqW\&# BzJ]e/~S5-w4 +I{τ|Ack-umLKvo7~qk2O7OAZДx7WQ˚<-%-nxEPEPEPEPEPEPEPEPEPEPEPEP-|?/>˯_}(gmYo~z+ŸJgO䏢~'oBWAj1]KJ-d~t[WOK"nE*Wf)W|3|5 gHdѡ泂PE;Mgo=3T-?g izOcy,5=\B~ěڜ4yn :e?iuKFM>_tLy:=y/\ls?^u/X6Jk<[kjSCB[]""6^\]M5;%?CxER.v346i3plFy~V>Px3GkOt+-s)a,˽#&œM҉f V$"|?6$y7;7<[}./$'ͿN6 cco ''וutx6hWg~^ooMhw"iߘttMVhfK+v:M?߬~מ.&[wڥaw[g<6<ˤVikq4x4˘4dGgM13om!@ў{6<vW&{ \3y{&WI/DI9,e[k4,ȎUxkf mGM/D+ߋWCy4xKg?$>L"; ( ( ( ( ( ( ( ( JZ(( ( ( ( f} [LBRP_#3\?⣔Wݏz*}/éowiߣ{XqctaZ4r?ٳKG#I9Lk2okLUk@|5U{u[XlO*n{w[#[`rʥz{՛mӕsn?}Z:maYYag |+y|E<+o7-ևrIc/ٚd7o?5BM>T_ܼf\P|X%K#q"'\Zj7$3'i]Xѣ޼6|5,5ik3ksyfɇʯuMF6z%֧a$d^.fOΘn\JV?Kt͎?wzஅq]&snyIÿ.OoiZ"oGO:jOtruh_2O]nAK?s#@<7Eg5OgQ/.vo??6^wK;YKږM>i"dvJV1edhvXtQ.G٬ß_-xP4ߊũXiZsMCX[׺Dxw?/_Piwst*{Xx?7rEMnMnOb&+>]\\ӭ>ˉx?ξ_SV׀˽Co J.3598cCѾ>±M;zlR 6VwR4l!{_ףSFRG[rd{}AnKK>M7յ_GW??vs'F?oT{J_TyM/8-5hk-:VtjP%h+}vQA>-Zou(#Wk :ctt7MRm7o_x(<+u\gmo߷Wi I^}|ǧKbgS䌽G}OBWM;ALnKiD)wurkqJ.δ7Zc6 3E3&;FD>Wvo)'Ʌ߿OVVR1exysIR,>3iWGtrC/d\?X|`]G5c?*.>bTt_klmoG=Λ66o3J-;Cm΍,ۮnSIQ<= X| U5-O{>[=nP)2y =kacMcN4MapʯaךbɦegxGGխ+}JHْ7olxNT ּ75o*vD)Pʥ{oEվ(c>_hLdO%CxwZ-kJwm-Kt[sWh:tvt!iagj\4yWcoh+5F&&wۭ u(YJ$Ԇ[N5cKE4}cTyiaMk=FeA Þn黶qH$5|/ITo{'B55iT!o5%Դs*<~so+J?˯_}(gmYo~z+ŸJgO䏢~'oBWgwI? e>4IPB((((((((((((((((((((((MK;F  Ӣ|֥QXV~-ѵ_hVƷ`%͌s4(q=v=RNԦ,Ṙ#IvZ(t5?>qo6\6%}d ҽx_Ow DYЭ,=X֥DOgA}xlN{]E{sH-tcU׊mbyO:g^]jſV p=**3XNV}νi-.J{{fK?›=u]i⻋KMeÿKo;l_G/-6-THk.lG[|Z|w: NdfMQϒmTv'#S_*A(Z((ZJZ(8)◅ ߴǃ˝Ϸg77:vy^^#0|L(rC7V9dIOaq_~ʚo26١#=V'K>[YyyOx%wcD7wZw=DLSgf+Nᯅ!eTA+%DkOuZ~x,/hM"Cg܋>\;ӡ/z>fLwzm]olWZZiz&"wDŲU6楇6&Af,_0H u)eu+%Im;Mo$lM9m<,8)jIo-#Tٽ֔|=YDz(>YYaiiRcu,uVѾr^|8OxB=&+d g7|nirؼ4p}"CټVk]QeZ0'ڼ]6/֣+͋fbr Ip蝒̆V7F_?:RT)G^_|>-Լ2 ƭm7 cJؽ/].7f XW[ȉ\O~"]-V@h事y?m_/"0̷s$WzlRmʿ}ZF)r_]'LJi+!um閶iC5_>7FKahn-XM-W}o*IⵡSØ /Ա2_(8(ź~u?K|~7~ߟ< ooE~SL:O$ 5J>'oBWg?#ˆRRQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@G&퍳ԔPf#ƥs YxK̾ onHܽ!xw?r돋0]B SG"q5l&o;;0_F͡˧ڽcxPȿ./]۾m `Mj黮+Oy_㷌 iz~#u;TԼ.Тd<(؉&)߿jַޕ}9m'֖ktv#늡x6QmUXķ ՝n=9fyۚ=|A7ԖGӵQ 3BpGww67⽯}k^3 rȇz3\GQEbQKE%PQKE%-PEPEPEQEUk,`y!UhM"V? i3k TMi$!Q-w'Jw]SSh,a$?|FeJ3o x^޽oޫ2=7_Px.$z =.=DpU*?82̗w4cf12Px)N_ʢ4M5;KcZ=\\}6gYU"^Fѵ>=kה=c'&^"o-[h,W'rC%vu ռ\"}ExH6wzeRjZ֍qDHZ_}VCyg}cD/4y+C.-q ̓''r_E[qjj- lGDOR.5[-MgA|K} y/H4nz#4I4C^*ЌyeV<񌿯$^C;莟ܮMyKk=jdsfϹO ַ eז%_\׷k~,6zmnogye t19v# R~욑]rDW_ݧϹToh>&I6<KvIICeT߬㗋5K t.t˔_شKw}wst,bׯ}< x'ƚbu,~n>wSĞy-:|ޏză-Ԯ5^ݎEJx~} Lj5ikٽR/u,Q_ ;]}^Jpk h񖱩RiOjRKi*',qOmn{uV9LT=E,D*F2i=ΖηG5=tQEu?K2>~_ gYo~z(?x߿ފ;&pҙfuS#蟃I`k/5|OY脮Ϲ*G?7 ( ( ( ( ( ( ( ( ( ( ( +Ǐ/'541!T~n㯄.eҢP7ڒ|]:oTopV|#)3FkBŢ5ǚ^)⻾wKk-::ivr/mobx[PöZ7qX5g?G/uN,нحgD'?G5<gtֱ\Ds 5c5@- SĖNMo}< Oko$TQ=PAEVib]#U Vhe]"u TV#~Z^k;-/¾_ůE~K%BdK{fDzs|5uه@OL<=o &c<G𾥮%^٦TdWӾ;xn ;XD!^,Cx8\5!8_+Ð)$6}l5JK^- JZ(.:5ޗmqes{jAoSF$ kܺJ~<~ ,_kȦ4|7&6e6ᛴ1߫V+5n{[mqgowwÿ t 8V~Zl+_.Ќ bjR\OvZD0[X(uǮkZFwK  }Y'&k@*!_'DFDSis>Zcx<<|>mKS}jMt-MO\'Z Z!QҮ4Oi/j)EY"uk?rx嶷*iBi~, t:<ڐ>}>}VMf/d*=/51-\My̟,ͳliuxoB27p6SBFǕ RǣYW_,ib_|KX3ŗ fHm4^i֐5k&>V_M7}sVk0TFcV+E\S袶8B( [_})_P?GW7?3/DOY脮Ϲ3D%v}~iS?L(-%-AQEQEQIFhhRfZ( )3Fhh(((fccmuulYt7F#ş5k[7~4qCmo ~wDDa{)8yR11ފ5 {UզdWl/-Gn;>DeM*mKE~ kx7Z> #;"y>OğRE-Ip fxG}[R/K.HzV~~K&#^x^OoWu!y'G}{g>'/t>ҿ\E6y|Ο{޺}3VV6ޘّfHYZr~r+Ievr.ms4>۾iM>r.L |E:wU;*+fgjo x?tT4Ht: v-rquK1E$7#Oq<:7mxk$l7j/:?l)~>&Y5 ;4ئtGH~w+E^5DnU7pk+OjZ #<7_i*lr9OUmJ]iy=ג.ѠtD}o>MץCịWd>ȻXoވ{}^V{xYZVhwͫZy\Fs) ^cl^IsuM&莟GGO}uxLNnc]ZGlړfߔ]=4j+y 5yWzkv'w߳<+?Nl;w>\1^7OڸEW\b|.Y.>h/[Z[_I$?lWƚ H.k]IdđSb#IyoGٸEG/(`/d|k{KW׬|Ku _X٦Fl=Gx|B:Zt˯"w0If؋S~V6i%x^)f$D0?V֮?}|;Rkg >]ʆ.l}~!ts:=o4kK_U/'cIDMF틏_~QuxZV—VRM`O7{ <-_ZŏN',˭^_ھwO>JMof/xu6mڼ}B5EY5K+{wg/|]}?QA{/t=׍!/y;{;<յ.Pw?sZۯ$)&ϓ{;ٿ޽7Vg,8!{62_[CG|ڸM]_)^o7մ5"xVLs&Ҷϱ'6y?>\߃-#Ӽ1mxKI}&x>}9_\l"fߔ]G쏑m>]]I Xv._?m>}7 y|iqm[\ˮ.Gؑ6O<|sWғxKx^Y4|HrYsO>r<=e/~){jMVƏI76#l6{T_45kZ痿e}Q&`ivjvo9|V_L_KQq[?kl^Uoi:֙.}OO'o߳6VO">{ s-xx”=>S/g?cO&OJ~1MRoڻ鷓Mi$s C4;%wGw+̵sR֣5 J8urlkuckkr\>;x7^6\0()0WW݁xga{j\ '~4LOΟWE߃!7 ƕhBiRX^Z=7(gΓ|+>&𖋭5+8o$:#zD0gңgYg^YCbq~Qn4 ;]) mDRת|R@((((((J)h(((N]kλڄ%d/_&ԺN$ԒK;WY΋fs{_?=H7?%|~7~ߟ< ooE~SL:O$ 5J>'oBWg?#ˆRRQ@Q@;Ww+y7q^:~)xd7lWA4\_Ópݿgם뚢cB.Dr@ 5(5ol{]۝3˶IǖG&R/{3u\i{lB}ݦxw⿅|[u-QX'^OũwK5i-,Zu(?$v_'\,Sv>yw]ibgmxJ<-hVg{U=⧄=Vަ{unV/_zo-olg&sK6;}y^ ?C0[7"rU_i#A״I|+}wWR #o mz:0^Xrqeoܚ7bI#v_oʏWEizťVoHeb?WxBRn&OGp_+CsOxsWuƝ`%Rؗe|+ϓu0%/=E̐͞FҢ* xJ|jT5ޝhj?m8_DZGɳ&hT<\ XB=cͩ:Rj+S(߈_ `/ ]oCGP9hɲN-+l Լ?^(]+RM4jO;GM(}+/W'"[nStn-7Ro 뚿]Gú$l smP&=/_Um?Wg> k6hTwTZ4[m[H^?5`~~]x:x6ìihaHMGof2??k.ki-kv"y3F}W*N1)G~xMV)yL֦(.\}7SgȕNYZ[ixoam/]'mzs^^kmngoʗXI{>Rе]?F溅HywþRC26w߃.Ӭ|I/7^u$_2̧g}|Ooж_<YxO drrڲ5_2Wsi|@գԦ[lJ>nVhks~mʈ}箧Xmb^ṇ}??~S׼fGSM-2ڄ6}VcG&=ō~Q<2g,඼O?jY}J`%u<6CgYnao[[oks;-Vm $ȚئҦJdzz'ٱ7_>课&Mt}:+-o{ݤl<0Qx_xgLMΏxJ]^z~=sZr}x`Wx]gi.4{e$Q̶߿42KM>ޝ Ō,47-潽Ke n~oZ6F-meBCð’GɞsX|7b~&ecizq-ydt ܴ3$.6.}>˩hsiQG5ŴR\M >s?P ֯ROxfrc&HR&]y@徸muq, O)SXZ4y>~lI"A;_@?'Ux. _K}_LφC{Hz- Op$kw&L}]_3[qOQ(()_4DԴ)ФC SWwX}&^'$2>~>:Y͇lN7x^9"<𚦣c#}KVYM}e͒}&ؓll(#l:惧R{k޵ɂs'k_Xny__Hl1}j"Mot;+^M.~Œ}2o|"M:l?7@R,(ǽ}Uy84ΟOI}/σm'O;o-ٮ`<~m9~9 ;񖋣no ;f}3?6%}qW\/q t;ᯅlu 9tBJsttc]N=XXQEPQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@;EGq(yz/h?@.ߟ< ooE_dS?,ο|$}wI? e>σI`k/5OH2IKI@-=ڥg. KI4ƲILyWa]G+kcaǓ$ry_'ֹV/)2}cw_VjOtG6^co`YDU{yEO~4ϊ:XZ\ö:6!,?B|Ms)ltMj:q2HFz嬾ٝȦrfo4GW6 os:oޓ'߬KqNx&x{ïzo-K u"EO*f䕾+k~5׈Wзӭm+7*o゚TG@U%#^O7wufiUq' >{Y\Ia-*LozUyL.U*sї/~'g}o{CΛ/$!ݼPCٮ(by<[ž7_ zfxFjLMNC ̶7uOK?Z˗>(ҵVoO%#o)g~XI͹GOIGM jgx|m}}5=C~?j^<i5Fq.u3Uׅ~$Znx/1fXF[wſEWdSRɋ #6l>?cN~^_w -Ƭm0LM\s{įxWd80g|o"Ѽ?&xjM]7Ñ${]崮7CSƩV5Ko綻3}w^Dk('2݌A RI ~?^ ׵;}6kKH"2'}\&K}k#hy#WݱsYT<v]<!9N>oR<((((((JET-xx&Iq{ؚhkُ_}ĮVoڔC-xjG7CuB/@Km8m=u> k7b.fR{$FGn_jZf-txZf&R%fkokK KGaoKDž'+*ơf[C4k,o ̓xwpܭ}{yំc&ԭPrw?kf,YA\sc;ț|ftQ?8Ms5izmǟlSFlP'jb^]b do%8W῍"T:z櫩Gk,6?(Km^?6wbӡgo9?} gWP f@4ɭcS},hM &?4ϭq{?4:>I }Dcz5R]-0j5zKx2A'cTt6+[;v {[8C7ϱ>r!L~Skx/Q/itCK=B'O?YzƋ|tm)-az? i9-Ӯ5X渾DDDH~}9kuaujt37/&>{GNRCk .Ǝg"{_&dX~9O[gH.cM6Kj m}HDM86&IB:ft&d7IGtpf~E'6!?VO_* |jX[>پ?dٿ__FzW? MZH?BhM%}xpi-kZ@Jbe1x{:e(ȗ-VQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE_Ѥ ǝ\F#Q~7vMO3G?7_!+k;$ ]s_T$( !KIKPnQI@SN9Y L};似<}O:6Mg|ʕ,:>ޝMc.6)%yb}&(~ape:dmm5dž-|4/4K&O|\y,-![Ǿܻ6yK\vx7\n4ra'{e_)7=zVԼ[gehѝ k{7G`?7|%mxF/ei7|.^oz-oc.*"+oY .K57Su$KU\nG>~R,揻.^o$r$VԮĿy6fWRV/?[:'73Y'#ǍIծsRFdOc~vT zNcKxbS6Wa.c̰Ue(/tM׬uG{M6C q+mC>_> qL1oO׬O✾" 𮩢ڽݥ'")O~mT4ߌ7z|>еIcL"nLE)J0Rt/z'ǫ} ^hkIa%?$hx<_k{t>y7ϾxD&uww+ױ$&ٽGZg/~udt4Ң}7dz9<%ZO{3ZC:]Ȓ>?JӓƚW7"sylol3Ρ Ιs4 =4,n~ߑkRM ]7V>UΛZgʛ>ߓѩ@4|䧝_3u5))?>U)m+VE6Q9w/o^ NV}KKyo'g ϗ/?<o?/\7/)'ݯ-~8ҽUtMkYʰI舟װxkX5{z[خtg G'xk*#7[݁94mC=#TQ]:y/u=7Kkƞ0Լ-h$MmKMHk+ )brMV>fg.4;Yu1$٬X?q>?}꩔)>h.GJ\cDJ}im]Zx@ZM PtW6m2è?Ų+fb} *_ѵ[-.k-6Roy+saP;4ciȿDMW8T)ɖ{[ۏ9ѷ#uo,#P,.&.'$ׅ-[^<#oj ˫o(׵(tVGp}vG?je)rh!־[Zf XtAp[uV7^7v1mk2B~į=׼e_xoQ}OD4bKXR{y6:?~ CBWWTwu,ɗb}Gg y9JLo9!}u+_x2;O7gz?|Y񗆼}M/M z_iix~K(YO7b'?|;[iv!w 2VjEw@$LIs1omɱw>)zE#_Z–3}~G5/t:ꚗyIl-hٍ$wD65 M.fHfD)g}GJ??GOJ WA4/'nso"9{Ⱦj>"'[xhGƐ-6nwuz[̏+qZϨh)!&GDG~._ș}v'}.xGsknvn}k(^-^5ƟaQ5[x[EO7qM 7Qٓa_5VOuⅻ4_^iSMa fhQ>}+XJ2ǧFFs"z]/.m&4K8^IqJ}yhRR@ KEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE_Ѥ ǝ\F#Q~7vMO3G?7_!+k;$ ]s_T$( !KIKPnQEr2l.˂OΓy:fh1=^&$}EiPom0Hjy̵JQ;])_QXxpZC.$E溻wQ{xCi}v7KrsV;2Uy¦JЌet+ԥ*R_Dkk?Mv>ˤykL2|響Yr^FM6_ww:6?,+'B?%kO9h0_ R{mOweVR gyҽ"uH7Dԭ'Ԧ͈+஁k4s t+GTV{]N*&oN4+fd5D3hx,do,>IdR/9-5 kmEUMKo}2)^m(>uw 'm|Í2&wY?/DRXY)UT]s:Ptc+NԩG.|:it_v_ |[Χiaw1ްw~-xgY[_*[Yz?:=Diҿ,M+cq"9a/8 YxE-_Uu[Y6is<|ֻ7ִdKm B"lOz'CPU hwSI#»ڷq< u/KOv~.]R-7Ckhr3JZ=v|-|9q»GU:QXbu1=_(8Š((((((c<ד|EsJN&CMi.@:Y*֍iP>Qe,Tȸk:?~gmr &I[=WoSa(rd?ZmkP֑Om Й#ý-g;^߄h km/nж^C5L]w\~^v ݞë\kQ,pfn#VԌ!hq'Pᷢw[o/v*oͭ=~e?2\1Yn0fޝ{}ϵ? 8e_4m{M:iwM -OFf[^3Bܦ͟#rFKBv~$Άśk_k sVwhYO/}'ٶ} Z*ԩ9iYxűiMn,.'KˌK>fO' o>,{jKy{ejjWL%IbN+XIrGK KEtQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@;EGq(yz/h?@.ߟ< ooE_dS?,ο|$}wI? e>σI`k/5OH2EPREPQKEbxg.OּׂSP⾒C(~kwMbj:l}+)!nKGnXէOK MGeڴfxrIZ5ź=vlh6I|;-Zͨǥhۻ13#skC̗$ܨ->xBkl|M{]]~;a^R^ﻧuunQ}\kiRoܿ#0XNk<?Es ƤuzH5Z*s_/~$jznk{7>M㦽44bؗM5}}< c j>kX[|+ZgYe2|柹$}⿇*ibEĩ_h;Wf+E5OkQj:]ܺue Z +^ȓ\-[3(Vovg|[/rh3ZX09((((((()h ( (9|;||tEs=ͥ֟Oe4NmR]>#}vMbU/Յy$EI_ּX,O}aù_QeUKOӖc8";Ch?!Kf#NU?{a3\q_MJ+EN#/rQEQEQEQEQEQI@ F{xuk-&bI}p-OAp+MNŃbt?SXoO&=iaC2?*Hs벓û:>ZZ]{ "*:o\M\x@SZ[u /-vs|Ql}*"fH._QG3/l{W oo$5-6 %\MW_7^2kdHx35wX~#_=.O~/xGI+]KIԷcT7~;O{gzW=ku鿵HwºX"Ym.&>z^DIq׊!VZ'M7kݮgz14BLi8D7#_xWk u= Zo*( h|.m%jŴ-/}*[|5A3kagN篞!|7n8x7HִSz-ƥ+Ody6Mi\͝n<=ZjQV0MKu~Ʌ>N{ORxso{u-Q&'u? !E_77׏Yxk|9K]OF.`-Ξ~ f￱S ntšF"G$1|VL2/hWtjp-}[C𵞓kHҮ[/H&q¾MO[k)lk$I]rZ?s> ^x١= RGGr?t{yO5sÞGψ4$ΛuP܊/ŏȱ컕d!___:|+gok-lu=Z&.7:N͉ /'.Nq}GtOY* 5\CifD⟷/lņc{oZJ>KIVXiW|ռ?FuA$t>M*xG<5`*((((((((((((((((((yz/h?G?{}#F\nJwYo~z(?x߿ފ;&pҙfuS#蟃I`k/5|OY脮Ϲ*G?7 ( ( ( ( ( ( ( ( JZ(gYb>aqZ/Lj8SϚkI/QI@`zk>(Z)(((WIcm%ěDVv;Wݶ%T+ր>B4!&5]:?:?/Z~,5KLnQme)Jx^:'~&2y*s\sq|%? tKoz-߉n|GɬR,.y.;g}+g?< I ǫCJdXџ/8&h_O3_*o|;2YEyo[=/$~}lret_;?dž?_[U-t^]&Pt=l76ȟ'ϝG>G9V];O!cm.;O~MV~6xgq]h_6@~:/k_'ekSXCi}sM[?yt?WOⵏtmY5ө,vs 'D3"li_asLڏׄ.[7roM.s#swW|koy5ƭul6?ڗ->x]~U >71_ Eu/Osed\Qp]rM.U{uJ5ׇ$_:©4 {Dk#RGGzk֍VvL?>Dtd>I413M50iw>?^1)7Ï^| QE:<Wt_H;OM"[ڝs/ Ϥ}7ٷn?5~үaH=k;4F[hR’}1_fTRv,d?fO;owk|4״:m[O`oK%46Lgga_hڷjOz>KLmJiK$68x?~.qquL@ xC^S55*M9#ZŽI4vfֹt2G״-KyT{I.p/1RM4CwDح=ǀA'5ռv}׎l*kƾ-xwT; 7\,|>Oj\wgl7O ֵ/|MuZ_MTck['4?y>Oc>v|uw,H<[ʉ7|3mf-;Gt+֊IarsDn&~ |?4vr9O6mm!I???߇z|}ͣP1?MOsg̿i#)~'xfi^7&ghF>t; 6wρnogq5wV}߁Y/1MuqE)o2|,L۔wf/ik,$/%;Dj|;i.Fr}QoͶRrc:XY#V_?;Ms>ɮXOu/>ixrY\H/>WٺdwO%I$J>JrQEnlQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEbxc<G4id{_?=H7?%|~7~ߟ< ooE~SL:O$ 5J>'oBWg?#ˆRRQ@Q@Q@Q@Q@h=ERnPBIz7Q@] E&F@ IFF@\dW|BKr2=h&Ӻ?='| Լ'qo]ɭY|A?H]6;k+[xUExKJV!%$OzƓ[^KʓDt^xJd>er!+Ou9ⸯ>=};Z@%_IKx5<9,V,5iЫDz]U E&(=Et-pQF(=E =EtQz7QE(pnQF(=E QzZJ7QF( Qz(pnQF(=E =E.pnMQzZ)7QF( h=E.pnMQzZ)7QF( h=E.pnMQzZ)7QF( h=E.pnMQ@\Z(Q@Q@Q@Q@;EGq(yz/h?@.ߟ< ooE_dS?,ο|$}wI? e>σI`k/5OH2TkO'TԢj'I5WMm%w[/t½7ep4Q\zk=J7HR.>W 7Z߉*SZEh:ͿMqyzPO:A<ΛV]=.{_>|7/sq%Sjsn})xHKQu9>}Mmg|>Ϲ\(`%%\rC Hg^_et ES?;_z/%a(ʤ.~EWOU)/PQ?}MM׷,7_q}j/PQ?}MM,7_p_((]//QQyޏPK=2kq*|8sԧZuqUNR;_xu/_uM?^Ck7D7y kNekjrVvrows SW>QG/RoO-ooul"6Fs%/GOߴ]]Zz׊_@M7ܶGd}}EL5kY5߱qq_:H2_PIw$s$qK?>W?mGVS^ҷ|d~=o$H'Gwz߾&O_DԼMcj:7<1|D։Y: oM#M Az1+{n2F 33q rQl{NsU<4G=<;Xk_(_טCm&Ҿ))e\M Y.S7'?q7G/PQy>k>GU}MM o?o.h揩U}MM o?o.h揩aU}MM o?o.h揩aU}MM o?o.h揩U}MM o?o.h揩U}MM o?o.h揩U}MM o?o.h揩U}MM o?o.h揩aU}MM o?o.h}w&CG&7?q7\Gߥ/Aw&CG&7?q7\ߣO/Aw&CG&7?q7\ߣO/Aw&CG&7?q7\ߣO/Aw&CG&7?q7\ߣz~Ws7?q7G/PQ|b~Ws7?q7G/PQwJ9"R6*s>ܥOŠ(((( O ǝ\F# Lk{\_H#k)>MӠogmӲo ?)g_>_>;$ ]q7_!+kJđeDL~UW+|g)zBѼ+oޛkoJK㧋~$~2[}3×6n%NHcGo_mut.5[GnAYxQQbsl ^! մ?ҵKu+8!~/g}ެ_#㦝m_x]i[.l_|)5exDiG ҧߏzo:4;SĚդF!שy O>DOx}}CG~%]YĂ?+t &=IM/|eN[羵|S.>+އn.fD_:9k\Ţa'Dh??}z~$^"6j-5M[; qWgbc߄OHƧ8x|;k^)Dz9=”)>+< Y%C_>z/ Y%C_>z/"usG4sG5'9ҥa7 @RbC?߯t+ch?真?_g]G̓?Lx>>0=_4 B}_)ӿ缈{'^W}7\ė?Lra:-WZm7 0sduxn=j>1ּSc7_a!q%~~Kb+e1G=&Za0|Moe;3+#Odh |'ZF\_[Fm*##7ϱҽKRrxmm-Rgԓ~^Sc|>Iog,?T=?kUvߧsxSQ#&ٱ|.o W|@t_ Kbuh%ñ6>|IO:%|%É&ߪM^˾6y/6"\d3i1`zOߙp(_>he$~?]IO?O^l@#6%ŮxҢ&lG=&;Ɩ)|xs?r?5y_Yė/W? ^D8|qttPɥ|G1<&?5kN5JO/ɶ|?*57!6|G7glt(Ol1ا:r#8msSC.$dO⏾>kT"ww5iS\]\~ߟC5Nm[İ<5h#ml3K{φf+e֌jx9O+$w[sk\oGr /ZmN;!>T3Sv59*5[)_]ozoTӼK:aDD)s:[}On kG>ڴmo^u˺}SzY *9ϒ0|*/ nG׼1j>կt鼷tr=W8"%T~2{Ա]7_Ogϱ2B|>Yǽq |!2WWt Jq u,: 7>𞹥ÑYֺ#ޛs֞s^&x_<#'V״So]Cee} h FoI w tSR3Qo=&ٳ_>?Aw_ <Ɠ62KL4C#iC_urm?u?xyqz/u[:Η.i:G?J? |ml|i{޽Ik}H}G%jx_DO xgKӢ0oO P.f4ԯs"}OWq[ZjJleoc@?"R%J-BO x[xgz\$6h;\y^"5E]7oprWf𸚟|<?пQ_ҿ +o:o&w,.#Ig}rlo.Fuȷֺ}\GJ[#Ͽ W+ҽXWzmou}K{i?t독:̈́q GúmԞOc}\#t >SXD|?BiG">I4wߊ.4o-V[i~)5n|CA[׆R2VF?g,625G =+җ=Wz6;PiZoL?dVsi~OoC]N^xOKԬ{=ZZ &~3=MOu?fyOG/i?{'һ]KɴIkcu-$}2jj~mRO??xJ_[!S9D ?"W;?ؗ%"o BE]VQѴi|׷Q0p>q\oK>zUIa- 5I~ϝ?Y׷rözbx5YYhs5i> Vow3[\w߹{*=Zjw HK"_as4KE7;rkqٞy/6ZͲM%twċ/4kodKE!oO͌p/>$`Zc"Lm%X\~W38t|,'~:jA/47|~K_V]C}p<0[g>h?JW6.u:[ϝ?} Y "o"-t4/L-nluMBKk>Ͼ菳zIXhɿ: 9fQ7׬u4߈?<,0֯&d#fϹ[>tE|D>mj>"^t7LI>ؕ8|`fzz6Vw׳>mmayw"|I5[ErKٲfw6Vwujixk6t;tP2Cgtw|9RGM7ú)\ܻΛ?ҭS}C/֏5j5@sL߱?zoZ?hhl{ۛ+v-gDc_ !Q_W^ιHm>#׍?b}7▝w/ždy'zob7RW/ќ?|p7z]}wawi){gHo?Vim֋{zM=z>JM[l+חu购kVWu9 VdGGM?#MT~8h:vhk58mVW o!D-|twٳ}/ȾwXҭP5K D}=՜Т?ϱ7k;.k;il/a}BG¿7èK\w| 7̑^X^=͛o}Nϙ;}j7;;zל;8.#:3*_KkaHHk? }"/)7e3b}KIK_Q@Q@Q@Q@懦}3˦H‰V.ߧogmӲo ?)g_>_>;$ ]q7_!+*G?|i -iM(oKHϪ ? W|jԴ!-YJgMZSԓ%_ ;.U]&;IZo%Lu~̫ҭtwM?;?]X~Bfc}|;ϖ/^V&WT[WR!yߪ3O |Kԑ.xf2:ltz~-zǏ)kxgҿSO1wS~?T''4{Asľ,c[/:F&tDJh0Zz~\Mu}X ^w}>[o:ƫ=2"+A-ŭgeiψ^^C_qEjxD?Tsa3NQjk6.$i$JM)hڦx^ϓ>!(].a?km7WeMdWy6L֗3]Oٿᶁo~s ;O)tƟñ'K,<>*}(?1_]4?E篒?]4?E篒_?ͿI>n~Dfi6_l_V k 0='?"}n+ia~¼31.6-m6 KU4G}jxwG5mFgclI~f埲|oso&myI<&t?4B,rUuz)[!-kڔcm OT:Zw0^Yӿ|Qߗ~v.i_h,w]ΑI(n!}íKxv\^5FTuS-(StDm}_N;m/6y%l?GOtG5/٤%%ˣLƟ_U_.uBd ̶VHfw>>OW7Siw[]:?uf+ ʪ|`֛?t_K$>am+DTiooJ?Ş%ӗR{x{³Kgr?-;»}+6 ];'g')4ޟ٦qV+.=_'y63HrRҎ+&4>M뭛g"'"s+W5R]r{ۍ{:pTO V1ӥS99k~ d~ {Eխ}Mzk߿d7Ŗui|9֠O~k6{W7X>c'~?x{\vw]k/ٮt뙝mow?i]4/|9ᗊ즹utԞTMfLמ|Bqi~&)=@Zo{X?WӎXMOLj{ZSӡ=^'xSptWiHM~kwO-''ᖺ-yԖTAmf{d7yi'LpM c]dxƩm'R]KxL;.%M|Teɿlڤh< 7xj_x7ƛ O;<#x{~1?{]]" Uxu=o~vfOKOTRMq}B4?m-?x~& [_Le[dg]ӭ4oQ>/moxOþ%Eɹ\$_y"5i/:=iq̞wN|돰G}Sm|+I:4yt6|?>WE~48nyiygٿc#^up>)/"(N2MO |ym W^ý[c\Cqk7s:?ܒ~!~Ж:׃"/oH&uGG? iyg' };x_~;x_6Ig$-o:'<)GI <. m4kkfd\:8ϑ0~N'Y7Z9_ڣCu'j4ϋz.5ZYç{*yG}ÿZx+^Ҧҵ wwy>͟xO4s^ʰ)| \i:0OLS{%yş4tuŋO:?~Do\?ȟx|WѬ3lT>X۱:P>,ۺltCsS-j1Yʓw'+rorDo"7WʻC1CoI/-I ?RM#(7?#x5g ?/,t`If;}sˤ&3\U~ok>nckk6m݅ͨ 4.?uʿ'ZXSNڬ`G2$>,ٯ0, gVu?~ggs!o5^ůi/ZFG[5P4_º-&4dO\C|<6~Lɼ'}xrQ|9Ԋ!'3y,O2R<Fŋ wI7H c^B]M#ɽz}W &3eMI猿fk{jbߙO㫥BU'e[_ ~5_%ݿ_]$|^ t9ύȞE)ZT_YvcGUj_t&5_E%"y0ww7%jrMsQE51]rK313e\RpB4oI4ZOIMo B;O.+KW|+[=U&S+{?N?oHk)0A™˳z#;7M_J4NEQ?3q5Wѭl]iTٽ#;Xs<}G'' &uo|W,xSϊI<>?+MS^x4 T-+T/&Hd*:5ŭ~,3F#)'OiuKWo~t|(_l5 >r[yΟf8yhXU&jeM #~Ϟ0,C /_Qjvki򣽿v<2}'[uy2:}|uSðGEURK_c$kҾ/1uF&s|;-QQ{2ux {?vxvoh/<#7}𥧋tXL!5]55 KƟG+~1~~!# j>xÚ֫om[GǙ?K /_Q<Qg=unA-s[_WH!{ْnX40;ޟ9V}~[kfN 7Ko96 +}OǙ?KiYb-06jX^{ivH2?4_O]xFEKƼ#3Z׿9}_[ù#93s Q~/E""<9%5_$W-;b}KIK_Q@Q@Q@Q@_S.ߧogmӲo ?)g_>_>;$ ]q7_!+*G?_rûA۽Ɓc̺:?U- OpxKK'Imnkwn> ^T[W4Һ=N~meo #W>h#+aax^xzMXO#eIcmhW׏%'-P}b'Οܯs־Ue͸s_Cq-ZGHS|aT>x}e|_BMZ!w?3Z'fm/JK&ܯ/g3RVx&mOW)%A5X7>ɚ(R5&'|||Ӿ_j5]Ne=C5d<ۛQG4y߁~9 V]vi/?#e 7cg>Z[sf_K7tţ֯kb]q|3q & s𣑭pԡ3.og[ ZRj<&N=)_Fy'/k(Wm$ѡtmJGoa\?~UK&.#i_YAlML<<s人zV/mp;{c}:F(Jkyd? >__;>#\;$9^7f餕SSnTT>%x̶OrQTŇEƕܣz5?{_9xz#vbAo~c?B!>ih7päMO:7gO~iWET΍q.ic67Mky߯t=a|}a =)C&}ٟ%e_'a Ȓ>M5mP:\6ϩ7irI3%{T|텭5xQ>"Wk)xW橩>D'B؉rAD;xɆDt~\>xd=|/qB<99$9aFG~8]Zxb9n4mr.ǿW\;\޼~Ί[OxWM]湨Z}_&"ѼȗV aqt~HnfXw7_C67yܯ6MJT)=zs4W_7NMs:iWwךL쏽!&͕0ω4xw7#ۭ~fY%ϑinKo>}˿*̈0t8eה?:{3f}\c &4ƐK{{i}a+7h|N:o<ߍo[MNeZ}[Mo7%w4_+y*{[kKI6;MxOo֌˭N=W>gqe6~;{دZLj?jI.{/ۮ^`=:HǖGxz?թs}S#NϬBd}k3F]ǎ>?S{U5þ˘ft?>OҸPտ`?%gfaWܐ;܏}?ٽ6<?Rq7O6hh恇4sG4s@4sG4s@5%.k4? 9\S{wUoWP4sQ){sUoWP4sKSk$Kh|6CyuCFCVŚޣu]kZ.AWP4s^EWGA]C<ʟbۺu .Go\)thkq5xoOǞυlңKkHZd9N=u|]Mkʚh7-Wxezfa[sk?W9/+5Ik C:|~n?hZO_9k j,VN;:z6~5G>_kּˏk^z/GOZMuKKr]x#\<)HQ,ֶֿjϞ7M?߬5x ]]b[2$HB>vgvkG\Q/?&b{sixImbMᱼtEѤt;tf?#6?,iqvZܬ:]ߗm4/jܾK.\Z.??&p#|p^ᛍio BCm^6an:q6d%jus:liy׻#Usg~  oܛF2gtDL|PZe^4Ғ(ڗqjޖˌg \#/_'+t(yIkmC)pXl6HKywOnhx'}n~$sGrw1ܣN>z/\Z.? W:ɿaߊqxm57MeΗ >lٴ;i.^go>-|d:O @K;8t&?^y?ּˏ/}-׼i''\_5kHX}HQ""YG/vHyPI^Hl[r&r?71f!NQ9%6_$W5D&lW?ZJZl`((((ź~u?K|~7~ߟ< ooE~SL:O$ 5Jk;$ ]~kS?L(>s|C/ko޾N7z/_-<)}kĚ&]\I3o_Vwcu3}K?|gb~4m Hl$!r9<&JS|:ռ;6 >PMBxPs箇 ƛy~%5GKMִ}sK,9J)QɴYx'H5xMt׶^KoݹexSo?4v6ky/a&O^:&ᮡxYM;H[hU|>^R7wq^V.sU+(B!غt9hC|EO9Ok-w k_SLjg/g&}隞,Cx:'MzM4 bmJ_i:\Lϓi n$|_|@WռcsF3=ЩV'AG-:Uc7>:k s1jznkoy+M &'Wƺj/}e oꑤ"&xǵ]I/?~G5+vC_Yi/|Q'%b~^kZ&!-rHMAa=~Nչ)L$GdzyzSh?tv3x^cYq Q^weV.෱OOɼoBG_=L mSO ,NzRǰG0G~L!{e=^]ܣ0Ͳt>=p##6GOP/j|7(}"'?OK{v<ÿ5 \ k?t6k[˭VdktH}?դm|'t]D߷6G?_Ep//GV?/pR?T?5J~~Eb7%.A;|TOz}kOnK%? J]ܗJ~'J|֏=?'7%%.n;$ J][?NTOhO} D _O_OxL/O־S D _xo=?y5/$ J]ܚo%.c'aJ|֏=?7&D _RMwL7O־Կ|5+tn;$ J]Z?NTOz}knMK7_G7&D _Xo?yO} ɨ&kWԿ|5+t}k@8}S ?S=?y5$ J]ܚo%.c'aJ|֏=?7&D _RMwL7O־Կ|5+trj_I>>)Z~GZRM ɩ&kW;pz}h_@rj_I?5/$ J]Z?LTOz}knMK7_G7&D _Xo?yO} D _O_Gֱ0%>{GZO_G7%%.'aJ|֏=?'7%%.nK%? J]Z?NTOz}kU)>opWԓf#_[?N?J|֏=?ZY} yOyTṯ5I>8}O ?S=?yb5)/$w;E. mý}cNSOz}kmm~߇wl#??q'ܑW^Ϗ>)󷞟Z<ȿ>nO G߳}>8}O ?S=?y#{?]7?mm cPG~;ʁ"}Qwxo9O}nKS Ϩ*mg>)I_:'. ˨)k;p^z}h_AtJ~ԡo._#|n+t}o@8}O ?S=?yu%? N]8*k;p~z}i~ПZPS Ѩ)kw;phO~/d7vtԋ?WJ7xo h6ZA~ {&^ҏ"KOIJZ((((ź~u?K|~7~ߟ< ooE~SL:O$ 5Jk=$ ]~iW?L(?h3I}=>,o'!~If죒0:9[{ f|Q&$s}}ǵF~v2YXj3Z[Bߗ;p?-q}Z'oUg-ő|+}NʆE5?Ic*2;wܧ/`[\BI0L|+q~;iBi7 =!H3pzD=5։ Yu[.K%#_^ǿz|{C!>״PM]&7(6.!cnQoI~rqVr FVMbxQ!Qÿzo뻫knEswU?BK4ޡo߽\wZMuo;Yklv3'gߣk#)hb~]Nh?/CSW%°h—]^Gy ñ|.>M'EIwt}kQA?t?fv' 5_jf?x⯆&-ȼ7iJBs٢"?؝&{wN^◇|JuX-絻K8t46N oG7z'~(_GCj?r0$O`TI|=bOm &_(/::Mħ>%R3CguAm;3Kz}O^ VM\|r/m__GCiؿ ?':#DtO˜ 0=k^'_??kZp]֌ Db)>3G;OO?֜f,hk~'o?Cj֌WGƿQ ?'QA?t?fW]˾=hֿQ? ?'QA?t?fW}ˏƏƿQ ?'QA?t?fW]ˏƓԏv7 4ñOhx?WsޖQؿ 'SA?t?fϗQA?t?fv7 48~[_o?Chc|(:3GӁQA?t?fv7 48~[_o?Chc|(:3GӁQA?t?fv7 48~[_o?Chc|):3GӁ__??Chb):3Q0W]˼Z0=k^'_??hZp]/wF~ñ~K^'N ~v+Ea$w ^fb!sGU&{oftKa"::#}r^ ӥ6åM4txa?~(/;?mSgeELu2qO<3jG=F)h^H~3O戮xW|7]aafFGMA^o+v/ 4_GCje1G+!<3 :jzl}%Y7"7|"K>xOoOwH,!!͓lW~ Nm ˣv{~5ȎDc|)?:3G;GQ|Jegfj>Xվ-|)u[] Ou>ffϿ >7x?XjZ>d Pó~O_\ðO~(?팳~iva>d?_Z">F-S6?O/V𶛫7zƟB}Fm}$Ͽ+ub':?:3B13sYF2ї$O,1|6^5cґM M#m0z+ CW5ْX!EGKhwgs~)_GCkG^?O_"yqxo̗O{KdyyHQ&ϾWJuahH^'{'_in ncʒ}>R9?Uח嘊8V=j(>((((.mEO $'\n`?K#֍־F?#\?W?fLca,wZ]־E?#\?W?f\}~10G[| Fʹ4zعca,wZ7ZЍsh?#\?ss??Y\| Fʹ4zعca,wZ7ZЍsh?#\?q~>=h=kooCB7UЍshϯ?ۘp=k_oCB7UЍshϯ?ۘppW?foCB7U>n`?K#֍־E?#\?W?f\ca,Z7ZЍsh?#\?1~>=h=kooCB7UЍshϯ?ۘw_oCB7UЍshϯ?ۘw_oCB7UЍshϯ?ۘw_oCB7UЍsh?d}uލ/7* Fʹ4b~>FzЍsh?#\?ss??Y]nw| Fʹ4zعca,{ѻ޾E?#\?W?f\}~10G[_"zއo3G.a>n`?K#nW?foCB7U0_?0%z7{ȿއo3G7*ϯ?ۘw_oCB7UЍsh?d}uލ/7* Fʹ4b~>FzЍsh?#\?ss??Y]nw| Fʹ4zعca,{ѻ޾E?#\?W?fLca,{ѻ޾E?#\?W?fLca,{Ѹzȿއo3G7*_?0%F_#zއo3G.a>n`?K#֍־F?#\?W?f\}~10K#֍־F?#\?W?f\}10K#֍־F?#\?W?f\}10K#֍־F?#\?W?f\}10K#֍־F?#\?W?f\}10G;| Fʹ4zعcaG;| Fʹ4zظs??Y\| Fʹ4zؘs??Y\n77* Fʹ4b_??Y\n77* Fʹ4b_??Y\n77* Fʹ4bcd}szѸzއo3G7*_?0%F_#zއo3G.a>n`?K#֍־F?#\?W?f\}~10G;| Fʹ4zعca,wZ7ZЍsh?#\?ss??YQ.u _*$<)]U-{_-zއo3G&?}0K!?o_ߴ2>)AብѰ!Pyy?E}W #5> 3(O9E endstream endobj 15 0 obj << /Type /Page /Parent 3 0 R /Annots [ 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R ] /Contents 16 0 R >> endobj 16 0 obj << /Length 6410 >> stream 0.153 0.153 0.153 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 358.998 521.469 398.986 re f 0.773 0.773 0.773 rg 45.266 358.998 m 566.734 358.998 l 565.984 359.748 l 46.016 359.748 l f 566.734 757.984 m 566.734 358.998 l 565.984 359.748 l 565.984 757.984 l f 45.266 757.984 m 45.266 358.998 l 46.016 359.748 l 46.016 757.984 l f 61.016 374.748 m 550.984 374.748 l 550.984 375.498 l 61.016 375.498 l f 0.153 0.153 0.153 rg BT 61.016 749.193 Td /F4 9.0 Tf [(accounts as the users are not often aware of the dangers of phishing and are not informed about how to spot them.)] TJ ET 61.016 708.006 m 550.984 708.006 l 550.984 711.006 l 61.016 711.006 l f BT 61.016 721.704 Td /F4 9.0 Tf [()] TJ ET 0.000 0.000 0.000 rg BT 61.016 690.215 Td /F4 9.0 Tf [()] TJ ET BT 63.518 690.215 Td /F4 9.0 Tf [(You can report phishing scams and spam in two ways:?)] TJ ET BT 61.016 670.226 Td /F4 9.0 Tf [()] TJ ET BT 61.016 650.237 Td /F4 9.0 Tf [(1.)] TJ ET BT 68.522 650.237 Td /F1 9.0 Tf [( By reporting it on the ICT Partner Portal.??)] TJ ET 0.000 0.000 0.000 RG 85.866 633.064 m 85.866 633.477 85.696 633.886 85.404 634.178 c 85.113 634.470 84.703 634.639 84.291 634.639 c 83.878 634.639 83.469 634.470 83.177 634.178 c 82.885 633.886 82.716 633.477 82.716 633.064 c 82.716 632.652 82.885 632.242 83.177 631.951 c 83.469 631.659 83.878 631.489 84.291 631.489 c 84.703 631.489 85.113 631.659 85.404 631.951 c 85.696 632.242 85.866 632.652 85.866 633.064 c f BT 91.016 630.248 Td /F4 9.0 Tf [(Go to )] TJ ET 0.373 0.169 0.255 rg BT 91.016 619.259 Td /F4 9.0 Tf [(https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 618.108 m 388.133 618.108 l S 0.000 0.000 0.000 rg BT 388.133 619.259 Td /F4 9.0 Tf [(.??)] TJ ET 0.000 0.000 0.000 RG 85.866 611.086 m 85.866 611.499 85.696 611.908 85.404 612.200 c 85.113 612.492 84.703 612.661 84.291 612.661 c 83.878 612.661 83.469 612.492 83.177 612.200 c 82.885 611.908 82.716 611.499 82.716 611.086 c 82.716 610.674 82.885 610.264 83.177 609.973 c 83.469 609.681 83.878 609.511 84.291 609.511 c 84.703 609.511 85.113 609.681 85.404 609.973 c 85.696 610.264 85.866 610.674 85.866 611.086 c f BT 91.016 608.270 Td /F4 9.0 Tf [(Fill in your information and add the email as an attachment. Your request will automatically be logged on the )] TJ ET BT 91.016 597.281 Td /F4 9.0 Tf [(system.?? ??)] TJ ET BT 61.016 577.292 Td /F1 9.0 Tf [(2. By sending an email.??)] TJ ET 85.866 560.119 m 85.866 560.532 85.696 560.941 85.404 561.233 c 85.113 561.525 84.703 561.694 84.291 561.694 c 83.878 561.694 83.469 561.525 83.177 561.233 c 82.885 560.941 82.716 560.532 82.716 560.119 c 82.716 559.707 82.885 559.297 83.177 559.006 c 83.469 558.714 83.878 558.544 84.291 558.544 c 84.703 558.544 85.113 558.714 85.404 559.006 c 85.696 559.297 85.866 559.707 85.866 560.119 c f BT 91.016 557.303 Td /F4 9.0 Tf [(Start up a new mail addressed to )] TJ ET 0.373 0.169 0.255 rg BT 225.080 557.303 Td /F4 9.0 Tf [(csirt@sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 225.080 556.152 m 289.232 556.152 l S 0.000 0.000 0.000 rg BT 289.232 557.303 Td /F4 9.0 Tf [(.??)] TJ ET 0.000 0.000 0.000 RG 85.866 549.130 m 85.866 549.543 85.696 549.952 85.404 550.244 c 85.113 550.536 84.703 550.705 84.291 550.705 c 83.878 550.705 83.469 550.536 83.177 550.244 c 82.885 549.952 82.716 549.543 82.716 549.130 c 82.716 548.718 82.885 548.308 83.177 548.017 c 83.469 547.725 83.878 547.555 84.291 547.555 c 84.703 547.555 85.113 547.725 85.404 548.017 c 85.696 548.308 85.866 548.718 85.866 549.130 c f BT 91.016 546.314 Td /F4 9.0 Tf [(Use the Title SPAM \(without quotes\) in the Subject.??)] TJ ET 85.866 538.141 m 85.866 538.554 85.696 538.963 85.404 539.255 c 85.113 539.547 84.703 539.716 84.291 539.716 c 83.878 539.716 83.469 539.547 83.177 539.255 c 82.885 538.963 82.716 538.554 82.716 538.141 c 82.716 537.729 82.885 537.319 83.177 537.028 c 83.469 536.736 83.878 536.566 84.291 536.566 c 84.703 536.566 85.113 536.736 85.404 537.028 c 85.696 537.319 85.866 537.729 85.866 538.141 c f BT 91.016 535.325 Td /F4 9.0 Tf [(With this New Mail window open, drag the suspicious spam/phishing mail from your Inbox into the New Mail )] TJ ET BT 91.016 524.336 Td /F4 9.0 Tf [(Window. It will attach the mail as an enclosure and a small icon with a light yellow envelope will appear in the )] TJ ET BT 91.016 513.347 Td /F4 9.0 Tf [(attachments section of the New Mail.??)] TJ ET 85.866 505.174 m 85.866 505.587 85.696 505.996 85.404 506.288 c 85.113 506.580 84.703 506.749 84.291 506.749 c 83.878 506.749 83.469 506.580 83.177 506.288 c 82.885 505.996 82.716 505.587 82.716 505.174 c 82.716 504.762 82.885 504.352 83.177 504.061 c 83.469 503.769 83.878 503.599 84.291 503.599 c 84.703 503.599 85.113 503.769 85.404 504.061 c 85.696 504.352 85.866 504.762 85.866 505.174 c f BT 91.016 502.358 Td /F4 9.0 Tf [(Send the mail.?? ??)] TJ ET BT 61.016 482.369 Td /F4 9.0 Tf [(If you have accidentally clicked on the link and already given any personal details to the phishers it is vitally important that )] TJ ET BT 61.016 471.380 Td /F4 9.0 Tf [(you immediately go to the USERADM page \(either)] TJ ET 0.373 0.169 0.255 rg BT 61.016 460.391 Td /F4 9.0 Tf [(http://www.sun.ac.za/password)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 459.240 m 185.063 459.240 l S 0.000 0.000 0.000 rg BT 185.063 460.391 Td /F4 9.0 Tf [( or)] TJ ET 0.373 0.169 0.255 rg BT 195.566 460.391 Td /F4 9.0 Tf [(www.sun.ac.za/useradm)] TJ ET 0.18 w 0 J [ ] 0 d 195.566 459.240 m 293.594 459.240 l S 0.000 0.000 0.000 rg BT 293.594 460.391 Td /F4 9.0 Tf [( and change your password immediately.\) Make sure the new )] TJ ET BT 61.016 449.402 Td /F4 9.0 Tf [(password is completely different, and is a strong password that will not be easily guessed, as well as changing the )] TJ ET BT 61.016 438.413 Td /F4 9.0 Tf [(passwords on your social media and private e-mail accounts, especially if you use the same passwords on these )] TJ ET BT 61.016 427.424 Td /F4 9.0 Tf [(accounts. Contact the IT Service Desk if you are still unsure.)] TJ ET 0.153 0.153 0.153 rg BT 61.016 407.435 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 388.946 Td /F2 9.0 Tf [(Posted in:Phishing,Security | Tagged:Phishing | With 0 comments)] TJ ET endstream endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 115.5317 639.0393 115.5317 639.0393 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115) >> endobj 19 0 obj << /Type /Annot /Subtype /Link /A 20 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 618.4266 388.1327 627.5841 ] >> endobj 20 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115) >> endobj 21 0 obj << /Type /Annot /Subtype /Link /A 22 0 R /Border [0 0 0] /H /I /Rect [ 225.0797 556.4706 289.2317 565.6281 ] >> endobj 22 0 obj << /Type /Action /S /URI /URI (mailto:csirt@sun.ac.za) >> endobj 23 0 obj << /Type /Annot /Subtype /Link /A 24 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 459.5586 185.0627 468.7161 ] >> endobj 24 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/password) >> endobj 25 0 obj << /Type /Annot /Subtype /Link /A 26 0 R /Border [0 0 0] /H /I /Rect [ 195.5657 459.5586 293.5937 468.7161 ] >> endobj 26 0 obj << /Type /Action /S /URI /URI (http://www.sun.ac.za/useradm) >> endobj xref 0 27 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000514 00000 n 0000000596 00000 n 0000003372 00000 n 0000003484 00000 n 0000003599 00000 n 0000003719 00000 n 0000003827 00000 n 0000003954 00000 n 0000004053 00000 n 0000107416 00000 n 0000107528 00000 n 0000113991 00000 n 0000114119 00000 n 0000114246 00000 n 0000114373 00000 n 0000114500 00000 n 0000114628 00000 n 0000114702 00000 n 0000114829 00000 n 0000114910 00000 n 0000115038 00000 n trailer << /Size 27 /Root 1 0 R /Info 5 0 R >> startxref 115118 %%EOF Security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Security

Email security

Friday, March 31st, 2023

Phishing and Report Message

View a PDF here: Phishing and Report Message Infographic

Stop waiting and start updating

Friday, March 31st, 2023

Why Windows Updates are crucial for your device’s health

This article was compiled by Elnita Jacobs, Computer Technician 1: IT General Support Services, and Bradley van der Venter, Senior Configuration Specialist: IT General Support Services.

In today’s world with the ever-changing threat landscape, keeping our devices up to date is essential for ensuring they run smoothly and securely. Windows Updates is one of the most critical updates we need to keep up with. 

Windows Updates visual

 

1 – The Importance

Firstly, let’s talk about why installing Windows Updates is so important. These updates are designed to fix bugs and vulnerabilities in the operating system, improve performance, and add new features. This means that by installing updates, you can keep your device running smoothly and securely and take advantage of new features that Microsoft releases. Windows Updates can also help to protect your device from malware and other security threats, making them a critical part of your device’s overall security.

2 – “Patch Tuesdays”

It’s also worth noting that Windows Updates are typically released on the second Tuesday of every month, known as “Patch Tuesday”. This means that by default, Windows Updates are enabled to install automatically, and you can expect your device to receive updates shortly after this date each month. Additionally, if you fail to restart your device after updates have been installed, Windows will force a restart after seven days to ensure compliance. 

Please note that this is not enforcement from Stellenbosch University (SU) but from Microsoft. 

This is important to keep in mind, as it ensures that your device stays up-to-date and secure, even if you forget to restart after installing updates. For example, suppose you restart your device immediately after updates are installed. In that case, you minimise the risk of, for example, being in a meeting and then Windows notifying you that it will restart in approximately 20 minutes. 

This will only happen if you haven’t restarted your device for more than seven days after installing the Windows Updates. 

3 – The Consequences

Now, let’s consider the consequences of failing to install Windows Updates. First, when you fail to update and restart your device, you leave it vulnerable to security threats. Hackers can exploit the operating system’s vulnerabilities to gain access to your device and steal sensitive information such as passwords and financial data. Malware can also infect your device, causing it to slow down, crash, or render unusable. Additionally, failing to update your device can result in poor performance, as bugs and other issues can accumulate over time, making it harder to use your device efficiently.

One of the most significant risks of not updating your device is the possibility of data loss. If your device becomes infected with malware or crashes due to bugs, you may lose important data such as documents, photos, and videos. This can be devastating, particularly if you have not backed up your data. Additionally, if you use your device for work, you may risk losing valuable business data, which can be catastrophic for your business.

4 – The Solution

What can you do to ensure that you are keeping your device up to date? The simplest solution is to enable automatic updates on your device (Stellenbosch University Windows Asset devices joined to the domain have this enabled by default). This will ensure that your device receives updates as soon as they become available without any effort on your part. Alternatively, you can manually check for updates by going to the Windows Update in the Settings option on the Start Menu. Restarting your device regularly after installing updates is also important, as this ensures that they are fully installed and can take effect.

In conclusion, installing Windows Updates is crucial for ensuring your device runs smoothly and securely. By keeping your device up to date, you can take advantage of new features, improve performance, and protect yourself from security threats. Failing to update and restart your device for updates can lead to poor performance, data loss, and security vulnerabilities. So, ensure you enable automatic updates or manually check for updates regularly, and always restart your device after installing updates.

Reference:

Risks of cybersecurity have become massive in higher education sector globally

Monday, October 24th, 2022

hacker phishing scam

Universities around the world are facing ever increasing cybersecurity risks, particularly in the post-pandemic world – and Stellenbosch University is not immune to these threats. Even before Covid-19 struck, higher education institutions were already gathering vast amounts of data from students and staff – and now, with more hybrid and remote offerings, requiring even more information, the risks of cybersecurity have become massive.

The risks for these data rich institutions are wide ranging and include ransomware attacks, business email compromises, data and privacy breaches, as well as adversary-in-the-middle attacks, said Brian Mhembere, the Cybersecurity and Technology Risk Specialist in the ICT division at Stellenbosch University.

Brian, who has a background in IT in the banking, mining, health and financial services sectors, has seen and heard it all when it comes to cybercrimes. With his finger on the pulse of global cyber trends, and with first-hand experience of the havoc that cyber fraud can create, he has, in the past, been asked to share his expertise in interviews on television and on radio. He was even interviewed on the 8pm news on ETV ahead of Black Friday, where he warned South Africans of all that can go wrong when shopping online.

Now, as a key cyber “sleuth” at Stellenbosch University, he’s determined to ensure that the valuable student and research data stay safe.

“There have been a lot of data breaches in higher education institutions mainly through phishing attacks – attacks aimed at compromising personal identifiable data or to reveal personal sensitive information like credit card numbers, bank information or passwords,” he said in an interview.

Brian explained that ransomware attacks take place when a cybercriminal threatens to use technology to either publish or permanently block a victim’s personal data unless a ransom is paid. A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.

An adversary-in-the-middle attack is when an adversary intercepts communication channels between two components, with the aim of either altering the message or data, or compromising the integrity of the data a person is trying to transmit, with the result that the message reaches the intended recipient with altered information or configuration.

Brian was responsible for the recent cybersecurity maturity assessment and report on cybersecurity at the campus. The analysis was done using the ISO27001 standard and the National Information Security Technology (NIST) cyber-security framework, which uses a Capability Model Maturity (CMM) tool to analyse where the weaknesses lie in the whole IT environment. The CMM tool guides the analysis of the entire IT environment with controls mapping and scoring exposing gaps, in accordance with the ISO/IEC27001 standards.

“The report did not find anything out of trend with most universities around the world,” Brian said. “Our university falls in line with the current state of cybersecurity maturity of most other South African universities. There is still some work to be done to improve the cybersecurity of all these institutions. Our maturity is very low compared to universities in the UK and America, but better than that in some other countries in Africa.”

He said the audit was conducted during April and May 2022 and the report has not yet been published or made public.

“Even if we knew the findings, we would not make them public, because anyone who reads this article would know what our weaknesses are,” he said. “Even if SU had ever had an attack, we would not speak about it in the public domain. There have been attempts but we are able to monitor and protect most attacks.”

Brian said the issue of cybersecurity at the university keeps him on his toes, but this is nothing new. “When I was working as head of IT in one of the major private hospital groups, we had an incident with ransomware called Wanacry. One of our managers’ PC was encrypted by the hackers as she clicked on an attachment sent by email which contained some malicious code. Luckily, my office was right next to hers. I was able to run through and I saw her computer countdown times which said they were encrypting all her data on the computer unless she sent an amount in Bitcoin.

“We managed to quickly isolate her workstation and to disconnect it from the Internet, but it was too late to avoid the encryption on that workstation. However, we managed to prevent it from propagating through the network. We lost all the data on her machine, but because we had a good business continuity plan, we restored the data on her machine from our backups.”

In a humble deflection of his own vital role, Brian said: “This colleague saved the day. She followed all the awareness products we were pushing which is a major thing, as users are first and last in the line of defence. I have always placed a huge emphasis on user awareness and on campaigns to create what we call the the human firewall against cyber fraud.”

Brian, who grew up in Harare, Zimbabwe, has always been intrigued with information systems. He completed a Bachelor of Science, Honours degree in Information Systems, Diplomas in Telecoms Engineering, and Networking whilst working in various sectors. He is a Certified Information Security Manager from Information Systems Audit and Control Association (ISACA) and has since completed a range of other cybersecurity certifications and, in 2018, completed a Masters in Information Systems from the University of Cape Town.

“This is really very interesting work, as well as being very important,” he said. “In the age of digital transformation, everything is moving online and onto the cloud. It’s exciting to be part of this huge transformation and to educate users on best practices.

“Of course it keeps me up at night,” he said, of his role at Stellenbosch University. “But thankfully, our current chief director of IT has prioritised cybersecurity at the campus. We both recognise how important it has become in today’s world, especially for universities relying on remote working which was necessitated by the pandemic.”

He said the IT division is assessing the findings of the university’s audit into cybersecurity and is now working on implementing the recommendations from the report so as to strengthen their security and control in the digital sphere.

Brian said he tries to keep up to speed on cybercrimes, locally and internationally. “Recently, Uber was hacked. There were data breaches, and the matter is still under investigation. Each incident teaches us lessons. We learn how they were compromised, what their vulnerabilities were – and we compare this with ourselves. We ask ourselves, ‘if this happened to us would we be able to defend ourselves?”

He also cited numerous recent articles on the subject of cybersecurity, particularly in higher education. Part of his job, he said, is to keep up to speed on all developments in cyber fraud, which involves reading research, articles and journals on the subject. During the interview, he gave figures and case studies from various studies, including the Bank of America, Checkpoint, Sophos and Verizon.

“For example, the IT security company, Sophos recently published its report, The State of Ransomware in Education 2022 in which they gave insights into the ‘ever more challenging attack environment’ in which the education sector finds itself,” he said.

“Key findings are that ransomware attacks on education have increased – 64 percent in higher education were hit in 2021. Education is the sector least able to stop data being encrypted in an attack – higher education reported the highest data encryption rate of all sectors at 74%.

“The study also found that … education has below average cyber insurance coverage rates – only 78% of education organisations have cyber insurance coverage against ransomware compared with the global average of 83%. Many education organisations are choosing to reduce the financial risk associated with such attacks by taking cyber insurance.”

Cybersecurity should be a priority project for SU, Brian said. “So much could go wrong when a university is targeted. For example, when data breaches happen with student admissions and other personal data, a university can be fined by the regulator in terms of the POPI act. If our systems are compromised, the university could be forced to pay a breach fine of up to R10 million – or ten years in jail.

“We need to be always searching for the gaps. Hackers work 24/7 and always come up with new ways to compromise and breach systems for corporate espionage, financial gain, or national security espionage. We have to keep abreast with what’s happening in the world as it filters back to us.

“I’m so glad that SU’s senior management has bought into the importance of cybersecurity. To have an organisation with a chief director of IT who gives her full support – from budgetary support to moral support – on the importance of cybersecurity is hugely valuable.”

Image credit: Thomaguery; Getty

 

 

 

 

 

 

Habits to adopt to ensure safety against cyber-attacks

Monday, October 24th, 2022

Cybersecurity on laptop screen while looking over shoulder

A student is innocently going through her emails. She sees one from a person she’s never heard of. There are spelling mistakes, but she ignores them and clicks on an attachment in the email. Suddenly her PC locks down and she can’t access her files. A message comes up and tells her she has to pay money to get her PC unlocked. Her data is kept ransom.

A use case from another university is a payroll supervisor logging into a public network at a hotel to check his emails and finalise the payroll. Later that evening he checked his email only to discover replies and emails from individuals he didn’t contact. His credentials have comprised and when he tried logging in again, he could not, staff salaries, personal information about staff all in the hands of a criminal. He was the victim of key locking.

These are real life examples of what can go wrong when a university is subjected to a cyber-attack. According to Dr Zenobia Davidse, IT Director General Support Services at SU, research shows that there has been an increase of 485% in ransomware threat level (Consumer Threat Landscape Report) and cyber-attacks are the fastest growing crime.

“These are picked up by the advance threat protection that is in place to detect them, and, thanks to efficient systems in place, they are averted, but it is still critical for all students and staff to play their part in ensuring the university’s safety against cyber-attacks,” Dr Davidse said in an interview.

“There are practical habits which everybody on campus can adopt to ensure safety against cyber-attacks,” she added.

In her position as IT director, Dr Davidse is in charge of “providing a set of services to assist, coordinate and support IT activities across the broader ICT function of the university”. Part of the task is supporting strategic initiatives across the campus.

A key task in her portfolio is the communication across campus about IT developments and threats.

Dr Davidse said there are a number of things which staff and students do which can put the university at serious risk – and these are often inadvertent actions. “Leaving your student card lying around is an invitation to gain access to SU buildings; failing to protect the password for your computer is also a big mistake; responding to a suspicious email, SMS or whatsapp is a no go – and even downloading a recording of a Teams meeting sharing the file with someone who should not have access to the information, can be serious repercussions for the university,” she said.

“Cyber criminals are constantly on the prowl for student information, data that they can exploit, systems they can keep at ransom – and they have very clever ways of getting it.”

Dr Davidse said there are a few things students should know when using the systems on campus. “It is important to be cautious when they log into the university’s various systems. Our correspondence to students would not be a request to fill in their username and password. So, if you receive any email, SMS or whatsapp from someone saying they are a representative of the university, and they need your password from you, you should not respond.”

Elaborating, she said: “A student’s access card is like a bank card because it enables access to different buildings, it contains printing credits, washing quotas, meal subsidies, etc, so if you leave it lying around, you can enable criminals to get access to places where your card has been provisioned for or deplete the credit.

“Another no no is to type your password out and paste it against your screen; or to share your password with someone else. Another action which is potentially dangerous is when staff create a shared folder and give people access without understanding that there is confidential information in there which others are not allowed to see.”

Dr Davidse said the university has a system in place to inform students which emails come from inside the university and which come from outside. “People should not ignore the ‘external’ sign that pops up in an email. Sometimes, you get an email, and you don’t know the person who sent it, but, out of curiosity, you click the link, start filling in a form or something and it is only then that you think, ‘but, why would the university ask me these things?’ Often it’s too late.”

Asked for practical examples of how students and staff can help to cyber-secure the university, Dr Davidse said: “A practical example is to use very secure passwords. Use a combination of lower and upper case letters, as well as numerical and alpha numerical – and never use the same password across different platforms. Do not use your university email address for a social media platform.

“Phishing emails and installing malware are methods used to gain access, trick someone share the username and password.”

Asked how staff and students can report cybersecurity risks at SU, Dr Davidse said the university has two very effective mechanisms. “One is to report the risk to the email, csirt@sun.ac.za, which is an email we use specifically for cyber incidents for prioritisation by our team.

“We also have a reporting utility within our email client. If an email comes in, there is a reporting functionality, allowing you to ‘report this message’ which you can do.”

Dr Davidse, who finds her job both challenging and fascinating, loves what she does. “I started off studying engineering. The most fascinating thing about engineering is to see how software can bring an idea to life; you see the promises of technology coming to fruition and the beauty of how it can really make things better in the world. I love how the answer is never obvious. You must do quite a bit of work before you find the solution to an issue.”

The best part of the job – which also involves linking the latest technology to the realm of higher education – is that it is constantly changing. “You can be finished with implementing one technology and the next piece comes out making it more advanced and innovative, so it’s never boring.”

Her last word, on cybersecurity, to students and staff, is: “People are trying to hack into systems all the time. It is up to all of us to protect our institution from this by putting simple measures in place and being constantly vigilant.”

Image credit: Guvendemir; Getty

New IT head puts spotlight on cybersecurity at Stellenbosch University

Monday, October 24th, 2022

Paper sheet with cybersecurity plan concept written on it

About six years ago, when Dr Denisha Jairam-Owthar was working as Chief Information Officer for the City of Johannesburg, the city was subjected to a massive cyber-attack which brought the organisation to a grinding halt. Hackers got into the city’s network and demanded money. The metro – the biggest in South Africa – had to switch to disaster recovery mode and all systems had to be shut down.

“That was when I experienced, first hand, the magnitude of a cyber-attack on this scale,” Dr Jairam-Owthar said.  

“When this sort of attack happens, the whole technical team faces a mammoth, urgent task. You have to look at every single system and find out where the vulnerability was. While you’re doing all this, you must ensure the organisation can continue to operate. This must all happen in parallel. There is no level of tracking or planning on paper that can prepare you for that day.”

At the time of the cyber-attack, Dr Jairam-Owthar had a four-month-old son. But that didn’t stop her from joining her team in working a gruelling 90 hours a week. “My staff and I brought sleeping bags so that we could sleep at the office, working shifts, sleeping for three or four hours at a time, manning our nerve centre to technically unravel this cyber-attack.” Her baby became sick from not seeing his mum, and the paediatrician asked what was happening at home. She explained that she was dealing with a crisis – and had no option but to soldier on.

Fast forward to today – and, as Stellenbosch University’s Chief Director: Information Technology Division, Dr Jairam-Owthar is always, on high alert for cyber-attacks on the campus. “Cybersecurity is one of those things that keeps me awake at night,” she said.

In an extensive interview, Dr Jairam-Owthar (39), who took up the position in January this year, was reassuring that SU is in safe hands. But with risks always at play, she stressed that cybersecurity should be “everybody’s business” on campus.

“Cybersecurity is a hot topic, because it is becoming increasingly prevalent. We see cyber-attacks on prominent organisations on a daily basis. They might have all the controls in place, but it just takes that one vulnerability to probe the weakness to come through – and before you know it, the entire network has been permeated.  It is not a matter of if a cyber-attack is going to happen … it’s a matter of when,” she said.

“CIOs have no option but to ensure that their cybersecurity systems are well resourced and resilient. The cost impacts on organisations and on society as a whole can be very difficult to come back from. Every CIO must be ready for when this happens and know how to respond – on a technical level, and on other levels, like how the institution deals with the situation.”

Dr Jairam-Owthar said the Covid-19-driven switch to digital acceleration has contributed hugely to the growth in cybercrime. “So many people suddenly found themselves working from home and depending on digital platforms. Cyber criminals quickly understood they could exploit this situation. Hackers are also highly aware that, in developing economies, many institutions do not update and upgrade their technology and infrastructure, and that’s where the vulnerability sits. These very intelligent hackers know we are challenged with funding, to keep up with technology. This is why countries in Africa become targets.”

Moving to why cybersecurity is so important for SU, she said: “This is an institution of real excellence in academics and research. We have researchers across many faculties, and there is so much research data in the system. Ethics in research is so critical. You cannot release the data unless you have followed all the processes. It is absolutely vital to ensure that the data, network and our online systems is well secured.

“On top of this, the system contains a great deal of students’ personal information – their exam marks, certificates and their whole student life cycle information. This could all be affected in a cyber-attack. When an attack happens, the reputation of the entire university comes into question, and those who fund research could become sceptical.

“I have to be able to say to my bosses at SU, hand on heart, that I’ve done everything I can to protect all our systems, network and information.”

Giving strong reassurance that SU is in safe hands,  Dr Jairam-Owthar said cybersecurity was high on her agenda when she joined the university in January. “With the support of the university’s leadership, we did an assessment of where we stand.  It found that we are well within the industry norm but there’s a lot more to do because, when it comes to cybersecurity, we are faced with a moving target. We cannot be static or complacent about it. So while we are fine in terms of the industry norm, we have to always drive to improve. The most critical challenge for CIOs is to keep up with this moving target of cybersecurity.

“We do have our controls in place as a university, but … even if we put in excellent controls; someone in Amsterdam for example can find a vulnerability. We have to be on the pulse, staying ahead of the target – because it is moving all the time.”

Dr Jairam-Owthar said there is also the issue of balancing costs. “Our partnerships with our vendors, such as Microsoft, become critical. We have to consistently ensure our vendors deliver value. The skill lies in balancing shrinking budgets with moving targets and higher expectations of technology.”

When she was at the City of Johannesburg, Dr Jairam-Owthar played a key role in the institution’s IT Digital Transformation. Passionate about education, she believes her role at SU is to enable education through technology at SU, because IT is a ‘critical enabler’ in the transformation of education”.

“The impact of what we do is to enable students and staff to be educated. That is the part that speaks to me as a person. Education holds a place in my heart.”

Dr Jairam-Owthar said the university recently did an analysis using the National Information Security Technology (NIST) cybersecurity framework.

“The NIST is a tool which does a full analysis of the entire IT environment and where the weaknesses lie, and how to prioritise to close the gap. That report has been done, and we are engaging on it in terms of priority and the budget to start implementing it to strengthen our controls and security,” she said.

Turning back to the incident at the City of Johannesburg, Dr Jairam-Owthar said it was “like walking through fire”.

“It’s like having an intruder in your home, and you are standing in the house and you don’t know which door the intruder came in. I never want anyone to go through that again. I wouldn’t wish it on anyone. We need to be well prepared.”

Asked what her main message to SU students and staff is when it comes to cybersecurity, she said:

“My main message is that cybersecurity is everyone’s responsibility, not just that of the IT Division. Everyone on campus – staff and students – need to play their role. To stress the importance of this, we will soon launch our cybersecurity training aimed at strengthening our human firewall which is the staff and students. Everyone on the campus, must do their bit to strengthen this human firewall.

“SU has such excellence in academia and research. Let’s work together to find the gaps and strengthen the systems. It’s the simple things like don’t share your passwords, make sure you authenticate when you get on the network, don’t go to sites that look odd; being able identify a phishing email. Check with us if you are not sure. If you get an email that doesn’t sound right, talk to us and we will guide you. Most cyber-attacks come through the human firewall. We cannot work in silos for cybersecurity either. We need a holistic approach for SU for cybersecurity. Lastly, make sure you do the training, it will empower you on what to look out for.”

When Dr Jairam-Owthar looks at her son, now a healthy, happy hi-tech six-year-old, she sees a boy who “handles a phone, an Ipad and a computer all at once”.

“It is for this generation that we need to bring the university into the digital fourth industrial revolution.

“I say to my IT staff that; our primary stakeholders are the 33 000 students and the 3500 staff of this university. I want to know what our primary stakeholders look for in technology so we can meet their demands in a safe and secure way, where we are also implementing a key principle of ‘security by design’ on any technologies we implement”.

Image credit: Formatoriginalphotos

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.