%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20211028060446+00'00') /ModDate (D:20211028060446+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4361 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 266.794 521.469 479.940 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 267.169 520.719 479.190 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HOW DO I REPORT PHISHING?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(You've received a suspicious email, what should you do with it? Firstly, don't click on any links. But just as important, send )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team \(CSIRT\) )] TJ ET BT 61.016 531.066 Td /F3 9.0 Tf [(can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.)] TJ ET BT 61.016 511.077 Td /F4 9.0 Tf [(What is phishing?)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(Phishing attacks are designed to steal a personís login and password details so that the cyber criminal can assume control )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(of the victimís social network, email, and online bank accounts. Seventy percent of internet users choose the same )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(login details, can access multiple private accounts and manipulate them for their own good.†)] TJ ET 0.373 0.169 0.255 rg BT 61.016 438.132 Td /F3 9.0 Tf [(More on how to recognise a phishing email.†)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 436.981 m 237.092 436.981 l S 0.200 0.200 0.200 rg BT 61.016 418.143 Td /F4 9.0 Tf [(REPORT PHISHING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 398.154 Td /F4 9.0 Tf [(On the ICT Partner Portal:)] TJ ET 0.400 0.400 0.400 RG 85.866 380.981 m 85.866 381.394 85.696 381.803 85.404 382.095 c 85.113 382.387 84.703 382.556 84.291 382.556 c 83.878 382.556 83.469 382.387 83.177 382.095 c 82.885 381.803 82.716 381.394 82.716 380.981 c 82.716 380.569 82.885 380.159 83.177 379.868 c 83.469 379.576 83.878 379.406 84.291 379.406 c 84.703 379.406 85.113 379.576 85.404 379.868 c 85.696 380.159 85.866 380.569 85.866 380.981 c f BT 91.016 378.165 Td /F3 9.0 Tf [(Go to†)] TJ ET 0.373 0.169 0.255 rg BT 115.532 378.165 Td /F3 9.0 Tf [(https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 115.532 377.014 m 412.649 377.014 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 369.992 m 85.866 370.405 85.696 370.814 85.404 371.106 c 85.113 371.398 84.703 371.567 84.291 371.567 c 83.878 371.567 83.469 371.398 83.177 371.106 c 82.885 370.814 82.716 370.405 82.716 369.992 c 82.716 369.580 82.885 369.170 83.177 368.879 c 83.469 368.587 83.878 368.417 84.291 368.417 c 84.703 368.417 85.113 368.587 85.404 368.879 c 85.696 369.170 85.866 369.580 85.866 369.992 c f BT 91.016 367.176 Td /F3 9.0 Tf [(Fill in your information and add the email as an attachment. Your request will automatically be logged on the )] TJ ET BT 91.016 356.187 Td /F3 9.0 Tf [(system.?)] TJ ET BT 61.016 336.198 Td /F4 9.0 Tf [(*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be )] TJ ET BT 61.016 325.209 Td /F4 9.0 Tf [(forwarded. This ensures the original email can be analysed with its full Internet message headers intact.†)] TJ ET BT 61.016 314.220 Td /F3 9.0 Tf [(Alternatively, use the mail application to save the email \(usually located under File | Save As\) as an .EML or .MSG format )] TJ ET BT 61.016 303.231 Td /F3 9.0 Tf [(to a folder location, and attach the saved file to a new email.)] TJ ET BT 61.016 284.742 Td /F3 9.0 Tf [(Posted in:Phishing,Security,Tips | Tagged:Malware,Phishing,Report Phishing,Report Spam,Spam | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 437.2996 237.0917 446.4571 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/10/how-to-recognise-a-phishing-e-mail/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 115.5317 377.3326 412.6487 386.4901 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000558 00000 n 0000004971 00000 n 0000005083 00000 n 0000005190 00000 n 0000005306 00000 n 0000005426 00000 n 0000005553 00000 n 0000005677 00000 n 0000005805 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 5932 %%EOF Tips « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Tips

New e-waste bins at IT

Monday, October 4th, 2021

¬†As part of the campus ‚ÄúGoing Green‚ÄĚ project Facilities Management will be placing e-waste bins at selected spots on campus. We encourage staff and students to use these bins for any non-asset e-waste.

Two of these yellow bins (see example right) will also be located at IT. A bin will be placed at the IT HUB by the entrance and a second one will be placed at the IT Main building in Hammanshand Rd at the service entrance (facing IT the door on your right) Both bins will be just inside the buildings by the doors. 

WHAT IS E-WASTE?

Electronic waste (e-waste) or Waste Electrical and Electronic Equipment (WEEE) are the terms used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, batteries etc. which have been disposed of by their original users.  More on e-waste.

We encourage all staff and students to use these bins for any non-asset e-waste. Bins will be serviced by Wasteplan and weekly inspections will be made by the university’s Wasteplan site supervisor to assess when a collection is needed.

For assistance and enquiries please email fmhelpdesk@sun.ac.za.

 

Remember to check your Junk Email folder

Monday, August 30th, 2021

To ensure that staff and students aren’t exposed to malicious phishing or spam emails our system administrators and security team had to enable a stricter spam filter earlier this year as added protection.

A spam filter assigns every message, received and sent, a spam confidence level based on the likelihood that the message is spam. Depending on its level an inbound message may be relayed directly to the user’s Junk Email folder. The filter looks at certain criteria contained in the email it rates, for example too many hyperlinks or a suspicious file attached. Tweaking the filter can be tricky ‚Äď we don’t want you to miss important emails, but at the same time it’s our responsibility to protect you and all our staff from harmful attacks.¬†

For this reason, it’s important that you regularly look in your Junk Email folder in case the spam filter might have relayed it there.¬†

The main purpose of Microsoft Outlook’s Junk Email Filter helps is to reduce unwanted email messages in your Inbox. Junk email, also known as spam, is moved by the filter away to the Junk Email folder. This is done at an institutional level by Microsoft (as mentioned above), but you can also flag or “un”flag messages from a person or company as Junk email.

How to change your spam filter’s preferences.
How to tag an email as junk mail.
How to report spam or junk email to Microsoft. (downloadable PDF-document) 

If you have any questions, please log a request on the ICT Partner Portal.

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics:¬†

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Microsoft Teams performance tips

Tuesday, July 6th, 2021

Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams meeting has minimum disruptions. The tips are split into three categories:

  1. Good practices
  2. Preparing for a trouble-free meeting
  3. Steps to take if you experience a poor connection

The good practices include:

  1. Regularly shut down and restart your PC ‚Äď at least once a day. The shut down and restart cleans the PC of processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the morning.
  2. Regularly run updates, ensuring that the operating system and applications are up to date. This should happen almost automatically on University owned PCs.
  3. Regularly run virus checks.

Preparing for a trouble-free meeting – especially important if you are the host or presenter for a meeting:

  1. Close all unnecessary applications.
  2. Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at Speedtest by Ookla – The Global Broadband Speed Test.
    For voice only and sharing images you need less than one MB/second. For sharing applications and using your webcam, you need between 1 and 2 MB/s.
    For video you preferably need 2 MB/s.
  3. Test if your PC has sufficient resources.
    For Windows 10 press Ctrl + Shift + Esc.
    For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field. 
    Start typing ‚ÄúActivity Monitor.‚ÄĚ
    The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.
  4. If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your meeting.
    To do this right click the Teams icon on the task bar and Quit, then start again.

5. If you share your Internet with other users (e.g. at home), ensure that the others know and do not hog the Internet connection. (e.g. do not play video, stream content, run updates).
Turn the camera off and use audio only if  the speed test or PC resources tests did show limitations.

6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus where you are unlikely to run into limitations. Use Ethernet (a cable connection to your router) rather than Wi-Fi if you have Ethernet available.

7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice switching devices so that you are familiar with how it works before you host a meeting.

Steps to take if you experience a poor connection:

  1. Turn the camera off if it was on.
  2. Turn off incoming video: (last item under the three dots menu).
    You will still be able to see shared screens and comments.

3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.

Adjust your font size

Wednesday, April 7th, 2021

Are the characters in your emails suddenly substantially smaller than a year or two ago? Not? Then you are clearly still too young. For the rest of us ‚Äď you know who you are, I see you squinting at your screen ‚Äď there is a solution.

We all know you can change the font of your text in Outlook, for example. The only problem is that the receiver on the other end will have to also read your email in Tahoma size 16. Ideally you should only use a font size of 11 or 12 whether you work in a Word document, in Teams or compile an email.¬†Instead of changing the default font in your applications, there’s another way.¬†

  1. If you are working on a laptop or tablet with a touch-pad you can access the Text Zoom function by stretching two fingers away from each other. This will activate the zoom function and whatever you read on the screen will be enlarged.
  2. If you are not working on a laptop or don’t have a touch-pad, open a new email (or reply to one) go to Format Text on your Outlook menu bar and select the Zoom option. It will give you the option to enlarge the text up to 200%. (See below)¬†

        3. The same can be done if you have a mouse with a scroll wheel button to adjust text zoom level (see below)

      4. Not all apps support the Text Zoom by using the touch-pad or Ctrl + mouse wheel. Here is another method for Windows 10 if you want to change the size of text, apps & other items for all Windows apps, other than just Outlook & MS Teams.  Just right-click anywhere on your desktop. Select Display Settings and choose the % you want to enlarge it with.

If you are still struggling you are welcome to log a request for one of our technicians in the ICT Partner Portal.

 

© 2013-2021 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.