%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717100504+00'00') /ModDate (D:20250717100504+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10901 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 169.049 521.469 577.685 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 169.424 520.719 576.935 re S 0.773 0.773 0.773 rg 61.016 184.799 m 550.984 184.799 l 550.984 185.549 l 61.016 185.549 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(STEP UP TO STRONGER PASSWORDS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F1 9.0 Tf [(Weak and reused passwords continue to be a common entry point for account or identity takeover and network )] TJ ET BT 61.016 626.431 Td /F1 9.0 Tf [(intrusions. Simple steps and tools exist to help you achieve unique, strong passwords for your accounts.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(A password is often all that stands between you and sensitive data. Its also often all that stands between a cyber criminal )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(step to protect against account theft.)] TJ ET 0.153 0.153 0.153 RG 85.866 567.291 m 85.866 567.703 85.696 568.113 85.404 568.405 c 85.113 568.696 84.703 568.866 84.291 568.866 c 83.878 568.866 83.469 568.696 83.177 568.405 c 82.885 568.113 82.716 567.703 82.716 567.291 c 82.716 566.879 82.885 566.469 83.177 566.177 c 83.469 565.886 83.878 565.716 84.291 565.716 c 84.703 565.716 85.113 565.886 85.404 566.177 c 85.696 566.469 85.866 566.879 85.866 567.291 c f BT 91.016 564.475 Td /F1 9.0 Tf [(Always:)] TJ ET BT 125.027 564.475 Td /F4 9.0 Tf [( Use a unique password for each account so )] TJ ET BT 305.117 564.475 Td /F2 9.0 Tf [(one)] TJ ET BT 320.129 564.475 Td /F4 9.0 Tf [( compromised password does not put )] TJ ET BT 472.193 564.475 Td /F2 9.0 Tf [(all)] TJ ET BT 481.193 564.475 Td /F4 9.0 Tf [( of your )] TJ ET BT 91.016 553.486 Td /F4 9.0 Tf [(accounts at risk of takeover.)] TJ ET 85.866 545.313 m 85.866 545.725 85.696 546.135 85.404 546.427 c 85.113 546.718 84.703 546.888 84.291 546.888 c 83.878 546.888 83.469 546.718 83.177 546.427 c 82.885 546.135 82.716 545.725 82.716 545.313 c 82.716 544.901 82.885 544.491 83.177 544.199 c 83.469 543.908 83.878 543.738 84.291 543.738 c 84.703 543.738 85.113 543.908 85.404 544.199 c 85.696 544.491 85.866 544.901 85.866 545.313 c f BT 91.016 542.497 Td /F1 9.0 Tf [(Good:)] TJ ET BT 117.512 542.497 Td /F4 9.0 Tf [( A good password is 10 or more characters in length, with a combination of uppercase and lowercase )] TJ ET BT 91.016 531.508 Td /F4 9.0 Tf [(letters, plus numbers and/or symbols such as )] TJ ET BT 285.587 531.508 Td /F2 9.0 Tf [(pAMPh$3let)] TJ ET BT 334.610 531.508 Td /F4 9.0 Tf [(. Complex passwords can be challenging to )] TJ ET BT 91.016 520.519 Td /F4 9.0 Tf [(remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also )] TJ ET BT 91.016 509.530 Td /F4 9.0 Tf [(difficult to type on a smartphone keyboard \(for an easy password management option, see best below\).)] TJ ET 85.866 501.357 m 85.866 501.769 85.696 502.179 85.404 502.471 c 85.113 502.762 84.703 502.932 84.291 502.932 c 83.878 502.932 83.469 502.762 83.177 502.471 c 82.885 502.179 82.716 501.769 82.716 501.357 c 82.716 500.945 82.885 500.535 83.177 500.243 c 83.469 499.952 83.878 499.782 84.291 499.782 c 84.703 499.782 85.113 499.952 85.404 500.243 c 85.696 500.535 85.866 500.945 85.866 501.357 c f BT 91.016 498.541 Td /F1 9.0 Tf [(Better:)] TJ ET BT 120.014 498.541 Td /F4 9.0 Tf [( A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional )] TJ ET BT 91.016 487.552 Td /F4 9.0 Tf [(length makes it's exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and )] TJ ET BT 91.016 476.563 Td /F4 9.0 Tf [(more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in )] TJ ET BT 91.016 465.574 Td /F4 9.0 Tf [(uppercase letters, and add a number or symbol to make it even stronger such as )] TJ ET BT 91.016 454.585 Td /F4 9.0 Tf [(rubbishconsiderGREENSwim$3. Youll still find it challenging to remember multiple passphrases, though, so read )] TJ ET BT 91.016 443.596 Td /F4 9.0 Tf [(on.)] TJ ET 85.866 435.423 m 85.866 435.835 85.696 436.245 85.404 436.537 c 85.113 436.828 84.703 436.998 84.291 436.998 c 83.878 436.998 83.469 436.828 83.177 436.537 c 82.885 436.245 82.716 435.835 82.716 435.423 c 82.716 435.011 82.885 434.601 83.177 434.309 c 83.469 434.018 83.878 433.848 84.291 433.848 c 84.703 433.848 85.113 434.018 85.404 434.309 c 85.696 434.601 85.866 435.011 85.866 435.423 c f BT 91.016 432.607 Td /F1 9.0 Tf [(Best:)] TJ ET BT 113.516 432.607 Td /F4 9.0 Tf [( The strongest passwords are created by password managers software that generates and keeps track of )] TJ ET BT 91.016 421.618 Td /F4 9.0 Tf [(complex and unique passwords for all of your accounts. All you need to remember is one complex password or )] TJ ET BT 91.016 410.629 Td /F4 9.0 Tf [(passphrase to access your password manager. With a password manager, you can look up passwords when you )] TJ ET BT 91.016 399.640 Td /F4 9.0 Tf [(need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best )] TJ ET BT 91.016 388.651 Td /F4 9.0 Tf [(practice is to add two-step verification to your password manager account. Keep reading!)] TJ ET 85.866 380.478 m 85.866 380.890 85.696 381.300 85.404 381.592 c 85.113 381.883 84.703 382.053 84.291 382.053 c 83.878 382.053 83.469 381.883 83.177 381.592 c 82.885 381.300 82.716 380.890 82.716 380.478 c 82.716 380.066 82.885 379.656 83.177 379.364 c 83.469 379.073 83.878 378.903 84.291 378.903 c 84.703 378.903 85.113 379.073 85.404 379.364 c 85.696 379.656 85.866 380.066 85.866 380.478 c f BT 91.016 377.662 Td /F1 9.0 Tf [(Step it up!)] TJ ET BT 135.017 377.662 Td /F4 9.0 Tf [( When you use two-step verification \(a.k.a., two-factor authentication or login approval\), a stolen )] TJ ET BT 91.016 366.673 Td /F4 9.0 Tf [(password doesnt result in a stolen account. Anytime your account is logged into from a new device, you receive )] TJ ET BT 91.016 355.684 Td /F4 9.0 Tf [(an authorization check on your smartphone or another registered device. Without that second piece, a password )] TJ ET BT 91.016 344.695 Td /F4 9.0 Tf [(thief cant get into your account. Its the single best way to protect your account from cyber criminals.)] TJ ET BT 61.016 324.706 Td /F4 9.0 Tf [(https://youtu.be/pMPhBEoVulQ)] TJ ET 0.200 0.200 0.200 rg BT 61.016 302.079 Td /F1 11.7 Tf [(RESOURCES)] TJ ET 0.153 0.153 0.153 rg 85.866 284.247 m 85.866 284.659 85.696 285.069 85.404 285.361 c 85.113 285.652 84.703 285.822 84.291 285.822 c 83.878 285.822 83.469 285.652 83.177 285.361 c 82.885 285.069 82.716 284.659 82.716 284.247 c 82.716 283.835 82.885 283.425 83.177 283.133 c 83.469 282.842 83.878 282.672 84.291 282.672 c 84.703 282.672 85.113 282.842 85.404 283.133 c 85.696 283.425 85.866 283.835 85.866 284.247 c f BT 91.016 281.431 Td /F4 9.0 Tf [(Check out)] TJ ET 0.373 0.169 0.255 rg BT 134.036 281.431 Td /F4 9.0 Tf [(http://twofactorauth.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 134.036 280.280 m 226.088 280.280 l S 0.153 0.153 0.153 rg BT 226.088 281.431 Td /F4 9.0 Tf [( to see a list of services that offer two-step verification.)] TJ ET 0.153 0.153 0.153 RG 85.866 273.258 m 85.866 273.670 85.696 274.080 85.404 274.372 c 85.113 274.663 84.703 274.833 84.291 274.833 c 83.878 274.833 83.469 274.663 83.177 274.372 c 82.885 274.080 82.716 273.670 82.716 273.258 c 82.716 272.846 82.885 272.436 83.177 272.144 c 83.469 271.853 83.878 271.683 84.291 271.683 c 84.703 271.683 85.113 271.853 85.404 272.144 c 85.696 272.436 85.866 272.846 85.866 273.258 c f BT 91.016 270.442 Td /F4 9.0 Tf [(Learn more about )] TJ ET 0.373 0.169 0.255 rg BT 164.555 270.442 Td /F4 9.0 Tf [(passwords and securing your accounts)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 164.555 269.291 m 320.120 269.291 l S 0.153 0.153 0.153 rg BT 320.120 270.442 Td /F4 9.0 Tf [( from the National Cyber Security Alliance.)] TJ ET 0.153 0.153 0.153 RG 85.866 262.269 m 85.866 262.681 85.696 263.091 85.404 263.383 c 85.113 263.674 84.703 263.844 84.291 263.844 c 83.878 263.844 83.469 263.674 83.177 263.383 c 82.885 263.091 82.716 262.681 82.716 262.269 c 82.716 261.857 82.885 261.447 83.177 261.155 c 83.469 260.864 83.878 260.694 84.291 260.694 c 84.703 260.694 85.113 260.864 85.404 261.155 c 85.696 261.447 85.866 261.857 85.866 262.269 c f BT 91.016 259.453 Td /F4 9.0 Tf [(Consider whether a )] TJ ET 0.373 0.169 0.255 rg BT 171.548 259.453 Td /F4 9.0 Tf [(password manager)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 171.548 258.302 m 248.075 258.302 l S 0.153 0.153 0.153 rg BT 248.075 259.453 Td /F4 9.0 Tf [( is the right choice for you.)] TJ ET 0.153 0.153 0.153 RG 85.866 251.280 m 85.866 251.692 85.696 252.102 85.404 252.394 c 85.113 252.685 84.703 252.855 84.291 252.855 c 83.878 252.855 83.469 252.685 83.177 252.394 c 82.885 252.102 82.716 251.692 82.716 251.280 c 82.716 250.868 82.885 250.458 83.177 250.166 c 83.469 249.875 83.878 249.705 84.291 249.705 c 84.703 249.705 85.113 249.875 85.404 250.166 c 85.696 250.458 85.866 250.868 85.866 251.280 c f BT 91.016 248.464 Td /F4 9.0 Tf [(Explore )] TJ ET 0.373 0.169 0.255 rg BT 124.028 248.464 Td /F4 9.0 Tf [(Five Ways to Upgrade your Password this Password Day)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 124.028 247.313 m 352.097 247.313 l S 0.153 0.153 0.153 rg BT 352.097 248.464 Td /F4 9.0 Tf [(, which is observed in May each year.)] TJ ET 0.153 0.153 0.153 RG 85.866 240.291 m 85.866 240.703 85.696 241.113 85.404 241.405 c 85.113 241.696 84.703 241.866 84.291 241.866 c 83.878 241.866 83.469 241.696 83.177 241.405 c 82.885 241.113 82.716 240.703 82.716 240.291 c 82.716 239.879 82.885 239.469 83.177 239.177 c 83.469 238.886 83.878 238.716 84.291 238.716 c 84.703 238.716 85.113 238.886 85.404 239.177 c 85.696 239.469 85.866 239.879 85.866 240.291 c f BT 91.016 237.475 Td /F4 9.0 Tf [(Find more videos and a quiz at )] TJ ET 0.373 0.169 0.255 rg BT 216.575 237.475 Td /F4 9.0 Tf [(http://passwordday.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 216.575 236.324 m 307.619 236.324 l S 0.153 0.153 0.153 rg BT 307.619 237.475 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 217.486 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 198.997 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Password,Security | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 134.0357 280.5985 226.0877 289.7560 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://twofactorauth.org/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 164.5547 269.6095 320.1197 278.7670 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://staysafeonline.org/stay-safe-online/protect-your-personal-information/passwords-and-securing-your-accounts) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 171.5477 258.6205 248.0747 267.7780 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://library.educause.edu/resources/2015/7/password-managers) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 124.0277 247.6315 352.0967 256.7890 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://nakedsecurity.sophos.com/2016/05/05/dont-do-it-5-ways-to-upgrade-your-passwords-this-passwordday/) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 216.5747 236.6425 307.6187 245.8000 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://passwordday.org/) >> endobj xref 0 22 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000582 00000 n 0000011536 00000 n 0000011648 00000 n 0000011763 00000 n 0000011883 00000 n 0000011991 00000 n 0000012119 00000 n 0000012196 00000 n 0000012324 00000 n 0000012489 00000 n 0000012617 00000 n 0000012731 00000 n 0000012859 00000 n 0000013015 00000 n 0000013143 00000 n trailer << /Size 22 /Root 1 0 R /Info 5 0 R >> startxref 13218 %%EOF Security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Security

Something’s Phishy…

Monday, October 24th, 2022

 

Why is MFA essential?

Tuesday, November 30th, 2021

Security risks and innovative cyber criminals are nothing new, however, when we work from home, these risks increase expeditiously. The only way we can combat security breaches is by adding extra measures of which multi-factor authentication (MFA) is one. 

Information Technology is currently rolling out MFA. Most staff and students have already registered. If you haven’t, we ask that you urgently do so as all users will require to use MFA to access some services. The first services that will need MFA authentication are the Microsoft365 applications. These include Outlook and Teams.

A guide on how to register is available at the bottom of this article and everything you need to know about MFA at Stellenbosch University can be found on our service catalogue.

WHAT IS MULTI-FACTOR AUTHENTICATION (MFA)?

Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data.  

Specifically, it enhances the security of your UserID by using your phone, tablet or other device to verify your identity when you attempt to access Stellenbosch University’s network and resources.  

It takes two items to access and update your information: “something you know” (e.g. your password) and “something you have” (e.g. your phone). For example, when you visit an ATM, one authentication factor is the ATM card you use to start the transaction – that’s the “something you have.” Next, you enter a PIN, which is the “something you know.” Without both these factors, your authentication will fail.  

WHY DO I NEED TO USE MFA?  

Passwords are becoming increasingly easy to compromise. They can be stolen, guessed and hacked and new technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts means information online is increasingly vulnerable. You might not even know who else has your password and is accessing your accounts.  

In addition, experience has shown that people are not as good at recognising malicious email as you might think. Every day, members of the Stellenbosch University community fall prey to cyber scams. Imagine you work on the University’s financial system. You click on what seems to be a legitimate email, typing in your username and password. A criminal now has your login details and can access everything you can access – including, potentially, bank details. In this way HR systems can be accessed and hacked preventing salaries from being paid paid out, etc. The possibilities are endless if someone has usernames and passwords. 

We must take steps to ensure that we are more than just a single click away from having our pay check stolen or becoming a victim of identity theft.  

Multi-Factor Authentication adds a second layer of security to your account to ensure that your account stays safe, even if someone else knows your password. This second factor of authentication is separate and independent from the UserID and password step — MFA never uses or even sees your password. 

HOW DO I REGISTER FOR MFA?

You can register for MFA by following the steps in this guide.

Read more on MFA: 

MFA FAQ’s

Back to basics: Multi-factor authentication (MFA)

What is Multi-factor authentication? And why is it important?

Video on MFA by tech expert Tom Scott.

Phishing scam from compromised university account

Tuesday, November 23rd, 2021

Please keep an eye out for an e-mail from a sun email address with the subject line of FYI_Order/Approval. 

It is a phishing scam with a link to a website that is designed to compromise security and steal details such as banking details, login names and passwords. 

The owner of the affected account has already put an Out-of-office notification on her account telling people to ignore the mail sent from her account, but the account is probably still compromised and under the control of the scammers.

Once in the university domain the scammers will continue to attack the university network to steal more information or to obtain bank account details, etc.

Here is an example of one of the mails:

 

Please report this phishing mail if you receive it from the above mentioned address or any other sun address. Here is how you report it:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Go to https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115.​​

Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.​​ Please add the suspicious email as an attachment to the request.

​​~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If you have accidentally clicked on the link and already given any personal details to the phishers it is vitally important that you immediately go to the USERADM page (either http://www.sun.ac.za/password or www.sun.ac.za/useradm and change your password immediately.) Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts. Contact the IT Service Desk if you are still unsure. 

[ARTICLE BY DAVID WILES]

Upgrade to Office 365 and Windows 10

Wednesday, November 3rd, 2021

Microsoft recently sent out a notification that some versions of Office 2013 and Office 2016 may experience connectivity issues due to the retirement of support for these versions. It is therefore imperative that all users who still use  Office 2013 and Office 2016 immediately upgrade their Office software to Office 365. 

Users whose devices are still using Windows XP, Windows 7 and Windows 8 as operating systems are also required to urgently upgrade their devices as this software is no longer supported by Microsoft.

Benefits of upgrading your software

With the challenges we’ve faced over the few months, why do we have to sacrifice valuable time to have my software upgraded?

New malware is released daily, putting your data and the University at risk.  So, apart from gaining new features by updating your software you are also protected from outsider threats as the new software has better security features, is more reliable and has better performance. 

When must I do this?

We recommend that users do this upgrade as soon as possible to ensure that you don’t fall prey to malware and lose valuable data.

Who will help me with the upgrade?

A support ticket can be logged on the ICT Partner Portal.  As soon as the ticket is logged, you will receive a reference number via email after which an IT technician will contact you to arrange an appointment to assess if an upgrade is possible on the device.

[Article by Ronel Reynecke]

­­­­­­­­­­­­­­­­­­­­­­­

Information Security Awareness Training

Tuesday, October 5th, 2021

Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.

So why would a university be targeted?

Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.

Consequences and why it matters:

Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.

A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.

In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.

To access the course, go to https://learn.sun.ac.za. When the SUNLearn main page opens, click on the “Information Security Awareness Training” link and log in with your network username and password. If you’re successfully logged in, scroll down and click on the “Enrol me” button to enrol yourself for the course and to access the training material.

If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via https://learnhelp.sun.ac.za for SUNLearn support.

 

 

 

 

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.