%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 40 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250713120124+00'00') /ModDate (D:20250713120124+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R 32 0 R 34 0 R 36 0 R 38 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10655 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 209.291 521.469 537.443 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 209.666 520.719 536.693 re S 0.773 0.773 0.773 rg 61.016 225.041 m 550.984 225.041 l 550.984 225.791 l 61.016 225.791 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WHY IS CYBER SECURITY IMPORTANT?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(the practice of guaranteeing confidentiality, integrity, and availability of information.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(someone elses system. Knowing how to protect the information that you have stored is of high importance not just for an )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(individual but for an organisation and those in it.)] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(Did you know that:)] TJ ET 0.153 0.153 0.153 RG 85.866 536.313 m 85.866 536.725 85.696 537.135 85.404 537.427 c 85.113 537.718 84.703 537.888 84.291 537.888 c 83.878 537.888 83.469 537.718 83.177 537.427 c 82.885 537.135 82.716 536.725 82.716 536.313 c 82.716 535.901 82.885 535.491 83.177 535.199 c 83.469 534.908 83.878 534.738 84.291 534.738 c 84.703 534.738 85.113 534.908 85.404 535.199 c 85.696 535.491 85.866 535.901 85.866 536.313 c f BT 91.016 533.497 Td /F4 9.0 Tf [(As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2)] TJ ET 85.866 525.324 m 85.866 525.736 85.696 526.146 85.404 526.438 c 85.113 526.729 84.703 526.899 84.291 526.899 c 83.878 526.899 83.469 526.729 83.177 526.438 c 82.885 526.146 82.716 525.736 82.716 525.324 c 82.716 524.912 82.885 524.502 83.177 524.210 c 83.469 523.919 83.878 523.749 84.291 523.749 c 84.703 523.749 85.113 523.919 85.404 524.210 c 85.696 524.502 85.866 524.912 85.866 525.324 c f BT 91.016 522.508 Td /F4 9.0 Tf [(43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began)] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 502.519 Td /F4 9.0 Tf [(here)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 214.592 501.368 m 232.601 501.368 l S 0.153 0.153 0.153 rg BT 232.601 502.519 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(The US government's Cybersecurity and Infrastructure Security )] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(Agency has made a collection of tip sheets available for use. )] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(These downloadable PDF documents contain all the information )] TJ ET BT 61.016 449.563 Td /F4 9.0 Tf [(you need to protect yourself from cyber security risks in a )] TJ ET BT 61.016 438.574 Td /F4 9.0 Tf [(convenient, compact format.)] TJ ET 0.153 0.153 0.153 RG 85.866 421.401 m 85.866 421.813 85.696 422.223 85.404 422.515 c 85.113 422.806 84.703 422.976 84.291 422.976 c 83.878 422.976 83.469 422.806 83.177 422.515 c 82.885 422.223 82.716 421.813 82.716 421.401 c 82.716 420.989 82.885 420.579 83.177 420.287 c 83.469 419.996 83.878 419.826 84.291 419.826 c 84.703 419.826 85.113 419.996 85.404 420.287 c 85.696 420.579 85.866 420.989 85.866 421.401 c f 0.373 0.169 0.255 rg BT 91.016 418.585 Td /F4 9.0 Tf [(Cyber security starts with you)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 417.434 m 208.547 417.434 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 410.412 m 85.866 410.824 85.696 411.234 85.404 411.526 c 85.113 411.817 84.703 411.987 84.291 411.987 c 83.878 411.987 83.469 411.817 83.177 411.526 c 82.885 411.234 82.716 410.824 82.716 410.412 c 82.716 410.000 82.885 409.590 83.177 409.298 c 83.469 409.007 83.878 408.837 84.291 408.837 c 84.703 408.837 85.113 409.007 85.404 409.298 c 85.696 409.590 85.866 410.000 85.866 410.412 c f 0.373 0.169 0.255 rg BT 91.016 407.596 Td /F4 9.0 Tf [(Creating strong passwords)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 406.445 m 198.053 406.445 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 399.423 m 85.866 399.835 85.696 400.245 85.404 400.537 c 85.113 400.828 84.703 400.998 84.291 400.998 c 83.878 400.998 83.469 400.828 83.177 400.537 c 82.885 400.245 82.716 399.835 82.716 399.423 c 82.716 399.011 82.885 398.601 83.177 398.309 c 83.469 398.018 83.878 397.848 84.291 397.848 c 84.703 397.848 85.113 398.018 85.404 398.309 c 85.696 398.601 85.866 399.011 85.866 399.423 c f 0.373 0.169 0.255 rg BT 91.016 396.607 Td /F4 9.0 Tf [(Cyber security at the office)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 395.456 m 197.558 395.456 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 388.434 m 85.866 388.846 85.696 389.256 85.404 389.548 c 85.113 389.839 84.703 390.009 84.291 390.009 c 83.878 390.009 83.469 389.839 83.177 389.548 c 82.885 389.256 82.716 388.846 82.716 388.434 c 82.716 388.022 82.885 387.612 83.177 387.320 c 83.469 387.029 83.878 386.859 84.291 386.859 c 84.703 386.859 85.113 387.029 85.404 387.320 c 85.696 387.612 85.866 388.022 85.866 388.434 c f 0.373 0.169 0.255 rg BT 91.016 385.618 Td /F4 9.0 Tf [(Identity theft and internet scams)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 384.467 m 218.582 384.467 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 377.445 m 85.866 377.857 85.696 378.267 85.404 378.559 c 85.113 378.850 84.703 379.020 84.291 379.020 c 83.878 379.020 83.469 378.850 83.177 378.559 c 82.885 378.267 82.716 377.857 82.716 377.445 c 82.716 377.033 82.885 376.623 83.177 376.331 c 83.469 376.040 83.878 375.870 84.291 375.870 c 84.703 375.870 85.113 376.040 85.404 376.331 c 85.696 376.623 85.866 377.033 85.866 377.445 c f 0.373 0.169 0.255 rg BT 91.016 374.629 Td /F4 9.0 Tf [(MFA \(Multi-factor authentication\))] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 373.478 m 221.552 373.478 l S 0.153 0.153 0.153 rg BT 91.016 363.640 Td /F4 9.0 Tf [(Also read more on MFA for Stellenbosch University staff )] TJ ET BT 91.016 352.651 Td /F4 9.0 Tf [(and students )] TJ ET 0.373 0.169 0.255 rg BT 145.052 352.651 Td /F4 9.0 Tf [(on our blog)] TJ ET 0.18 w 0 J [ ] 0 d 145.052 351.500 m 190.079 351.500 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 344.478 m 85.866 344.890 85.696 345.300 85.404 345.592 c 85.113 345.883 84.703 346.053 84.291 346.053 c 83.878 346.053 83.469 345.883 83.177 345.592 c 82.885 345.300 82.716 344.890 82.716 344.478 c 82.716 344.066 82.885 343.656 83.177 343.364 c 83.469 343.073 83.878 342.903 84.291 342.903 c 84.703 342.903 85.113 343.073 85.404 343.364 c 85.696 343.656 85.866 344.066 85.866 344.478 c f 0.373 0.169 0.255 rg BT 91.016 341.662 Td /F4 9.0 Tf [(Online privacy)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 340.511 m 148.031 340.511 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 333.489 m 85.866 333.901 85.696 334.311 85.404 334.603 c 85.113 334.894 84.703 335.064 84.291 335.064 c 83.878 335.064 83.469 334.894 83.177 334.603 c 82.885 334.311 82.716 333.901 82.716 333.489 c 82.716 333.077 82.885 332.667 83.177 332.375 c 83.469 332.084 83.878 331.914 84.291 331.914 c 84.703 331.914 85.113 332.084 85.404 332.375 c 85.696 332.667 85.866 333.077 85.866 333.489 c f 0.373 0.169 0.255 rg BT 91.016 330.673 Td /F4 9.0 Tf [(Phishing and spoofing)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 329.522 m 179.567 329.522 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 322.500 m 85.866 322.912 85.696 323.322 85.404 323.614 c 85.113 323.905 84.703 324.075 84.291 324.075 c 83.878 324.075 83.469 323.905 83.177 323.614 c 82.885 323.322 82.716 322.912 82.716 322.500 c 82.716 322.088 82.885 321.678 83.177 321.386 c 83.469 321.095 83.878 320.925 84.291 320.925 c 84.703 320.925 85.113 321.095 85.404 321.386 c 85.696 321.678 85.866 322.088 85.866 322.500 c f 0.373 0.169 0.255 rg BT 91.016 319.684 Td /F4 9.0 Tf [(Protecting your digital home)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 318.533 m 202.562 318.533 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 311.511 m 85.866 311.923 85.696 312.333 85.404 312.625 c 85.113 312.916 84.703 313.086 84.291 313.086 c 83.878 313.086 83.469 312.916 83.177 312.625 c 82.885 312.333 82.716 311.923 82.716 311.511 c 82.716 311.099 82.885 310.689 83.177 310.397 c 83.469 310.106 83.878 309.936 84.291 309.936 c 84.703 309.936 85.113 310.106 85.404 310.397 c 85.696 310.689 85.866 311.099 85.866 311.511 c f 0.373 0.169 0.255 rg BT 91.016 308.695 Td /F4 9.0 Tf [(Cyber safety on social media)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 307.544 m 206.558 307.544 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 300.522 m 85.866 300.934 85.696 301.344 85.404 301.636 c 85.113 301.927 84.703 302.097 84.291 302.097 c 83.878 302.097 83.469 301.927 83.177 301.636 c 82.885 301.344 82.716 300.934 82.716 300.522 c 82.716 300.110 82.885 299.700 83.177 299.408 c 83.469 299.117 83.878 298.947 84.291 298.947 c 84.703 298.947 85.113 299.117 85.404 299.408 c 85.696 299.700 85.866 300.110 85.866 300.522 c f 0.373 0.169 0.255 rg BT 91.016 297.706 Td /F4 9.0 Tf [(Cyber security while travelling)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 296.555 m 210.041 296.555 l S 0.153 0.153 0.153 rg BT 61.016 277.717 Td /F4 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 277.717 Td /F4 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 214.592 276.566 m 232.601 276.566 l S 0.153 0.153 0.153 rg BT 232.601 277.717 Td /F4 9.0 Tf [(.)] TJ ET BT 190.354 257.728 Td /F4 9.0 Tf [([SOURCE: )] TJ ET 0.373 0.169 0.255 rg BT 238.864 257.728 Td /F4 9.0 Tf [(Cybersecurity and Infrastructure Security Agency, United States Government)] TJ ET 0.18 w 0 J [ ] 0 d 238.864 256.577 m 545.485 256.577 l S 0.153 0.153 0.153 rg BT 545.485 257.728 Td /F4 9.0 Tf [(\))] TJ ET 0.400 0.400 0.400 rg BT 61.016 239.239 Td /F2 9.0 Tf [(Posted in:News,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET q 225.000 0 0 126.000 325.984 365.321 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 501.6862 232.6007 510.8437 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 417.7522 208.5467 426.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecurity_starts_with_you.pdf) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 406.7632 198.0527 415.9207 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/creating_passwords.pdf) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 395.7742 197.5577 404.9317 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecure_at_work.pdf) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 384.7852 218.5817 393.9427 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/identity_theft_and_internet_scams.pdf) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 373.7962 221.5517 382.9537 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/mfa.pdf) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 145.0517 351.8182 190.0787 360.9757 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/05/what-is-mfa/) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 340.8292 148.0307 349.9867 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/online_privacy.pdf) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 329.8402 179.5667 338.9977 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/phishing.pdf) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 318.8512 202.5617 328.0087 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/protecting_digital_home.pdf) >> endobj 32 0 obj << /Type /Annot /Subtype /Link /A 33 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 307.8622 206.5577 317.0197 ] >> endobj 33 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/social_media.pdf) >> endobj 34 0 obj << /Type /Annot /Subtype /Link /A 35 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 296.8732 210.0407 306.0307 ] >> endobj 35 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/travel.pdf) >> endobj 36 0 obj << /Type /Annot /Subtype /Link /A 37 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 276.8842 232.6007 286.0417 ] >> endobj 37 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 38 0 obj << /Type /Annot /Subtype /Link /A 39 0 R /Border [0 0 0] /H /I /Rect [ 238.8643 256.8952 545.4853 266.0527 ] >> endobj 39 0 obj << /Type /Action /S /URI /URI (https://www.cisa.gov/publication/cybersecurity-awareness-month-publications) >> endobj 40 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 168 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 10916>> stream JFIF,,ExifMM*i2 &0000 t2017:06:02 14:57:042017:06:02 14:57:04 }http://ns.adobe.com/xap/1.0/ 2017-06-02T14:57:042017-06-22T11:50:16 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N  1!AQ"aq2B$345DRS#6TbsUdr#Q!12"3R ?{+ol3xKJRqh +M_$[\ sHU9a/oe1E%Zed,<xA[rcr9.[ؖ(qwDy N }/xdmrXx'࠱9x@/B ZOYaE1j[q_p"2㌔EK ;]5ے/ , wX>pa؋%Kn1`p*vNB0B pf8Q[XV)3)hJm;7v(h^#L%dm]A(:5(B=0߹7U:TzJqR۫m*6rT$Q.LJM'u5GX*2Z&(2d{DRwX06:rqF.X܍4jTw#|ԫM/<x2\$ԕp /࠹  ;JNMAQ &KeDJa "mtGnlbB8J7=e6<JPN=loiWKls5)ʤWU(^Sv7NeMcV#}65Һj}R\3QKM4oSkQ)]C~ i|C~ii^כW9gLkCwsK1 rUZJ\`¹DގS/1%Iʍ]8' d馻%k&!QY{vlSjNR5'tӨўawKohFG3)}|)*ݵ0><#zgViMSSpJMCGPB8ԧ+56WT%?Ihxcv4usI*miQ{>nğV-r$+' tJķ垵FMF=Isr*j'Q{4,թpRVmljU%_=tF*?Aw/ 2PXf+#`;2#k|[`g-V*z:Y)Qٞ}h΅WJyy,dqS~ÚzΗ$f:k4Mll^$ﵱY=~r&ZZ=:n5u?)1Gj3vo O~%i?ittcGOJ4FxHj~?k(/wXz,xw$RZ_o\YmO>MTZ3rTՔDmԔQk9,pQI5ksr, v!;$s LH/rȹ_l# fx["cQPA ؂=o|6ҬNJNOk͖/ ؕ߫wmlS )h ݚg{Ay??>Ln26af7o?~X] o?,}-~P~uƟ/UcN?y,yV.UtiߧShk?'˔=­TWJV O 3L~4 ߺ?,~[Oqjվqax;ŵ~;^ Μ)FKO=ӓ;|>&O]NPK_?/?yuhu4/ꩨ^K'Ŏxɍ+-ĖrdVf&<:.qvv-՟NB1g6cT9;=!Ν pU Xӻ!o>`!l"dU8aaN>`y({)b^@9!~/"þHEj#wquhY:r~uR7=EH8uҋ[eFjNrr?hw.[qWٞO'B~enJFm/iv*tE9)7M^m4Vk;<ܲ+ 6ҳ}NWrn=,Ct9ISk؛UgWEfzҊZjGI] s;]{ؖ{aB䂯GX}c]%{J.>.[$[0!HT jTn;x o@΄z[XяTcGW>+;aRN5a\r@6ʌ\RHTu'=b݉E  @Xaa_UUN6dR_b_b,ֵriԹo'&Jhf,0as(0> startxref 26442 %%EOF Tips « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Tips

Connect to WiFi on campus

Thursday, January 27th, 2022

 

The Wi-Fi network used to connect to the internet access is called eduRoam. Here we explain what it is, how to register and why it is necessary.

What is eduRoam?

eduRoam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. eduRoam allows students, researchers and staff from participating institutions to obtain internet connectivity across campus and when visiting other participating institutions by simply opening their laptop.

To connect to eduRoam and start using Wi-Fi on campus follow these steps.

 

Before you leave

Tuesday, November 30th, 2021

The December holiday is almost here and especially this year, we’re all looking forward to escaping for a week or two. But before you leave, there are a few things you can do now to ensure that your return is seamless. Here are a few tips: 

  1. Activate your Out of Office function on your sun.ac.za Outlook mailbox and indicate in the message when you will be available again in case someone needs to contact you. Also, indicate who will be responsible during your time away and add their email address to your Out of Office.
  2. Make sure that your relevant work-related data is accessible for usage by your colleagues while you are away. However, do NOT give your password to colleagues when as this poses a security risk.
  3. If your sun password might expire during your holiday, rather change it before you go. If it expires while you are away you will be locked out of your account and it will cause unnecessary stress to deactivate it in January. 
  4. If you receive a phishing email on your sun account over the holiday and clicked on links or typed in your username and password, your account may be compromised. Immediately change your password at www.sun.ac.za/password and log a service request on the ICT Partner Portal. Your device will then be checked and scanned after the holiday. Remember that you can also report spam directly to Microsoft by using the handy Report Message function in Outlook.
  5. Information Technology will also be closing, like the rest of the University, on 24 December and opening again on 3 January. If possible, please log your IT requests as soon as possible before you leave. If you have a critical problem, it might be difficult to assist you a day before you leave or on the last Friday since suppliers also close over the festive season.

How to make a screen snip

Tuesday, November 2nd, 2021

They say a picture is worth a thousand words and even in the IT environment this is true. How often have you tried to describe a problem you have with your device to an IT technician, struggling to explain it over the phone or in an email.

There is an easier way and it’s called a screen shot, screen grab or screen snip. Many of us use this regularly on our cell phones to share images with friends or family, but it can be particularly useful if you want to show an IT technician an error message or what you are seeing on your screen. If you log a request on our ICT Partner Portal adding a screen shot makes the world of difference. A technician can immediately see the error message and start troubleshooting your problem.

So, how do you make a screenshot? One of two ways:

  1. In Windows 10 you can press the Shift+Windows button+S and it will open the Snip & Sketch option for you.
  2. You can type Snip & Sketch in your search bar (bottom left next to the Windows icon)

For a full explanation of how this handy tool works, the crew over at ZDNet explains it step by step.

So next time you log a request for our technicians, why not try out the Snip & Sketch tool? After all, it’s better to show, not tell.

[Information provided by George Whitehead]

 

 

Why is cyber security important?

Tuesday, October 5th, 2021

Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.

Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.

Did you know that:

  • As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2
  • 43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began

More tips and resources can be found here

The US government’s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format. 

More tips and resources can be found here

[SOURCE:  Cybersecurity and Infrastructure Security Agency, United States Government

Cybersecurity Awareness Month: Creating strong passwords

Tuesday, October 5th, 2021

Before we pointed out that most people underestimate the importance of having a secure password, and still make the mistake of using simple words and numbers as a password.

Keep in mind that your email and social network accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

  • Using email or your profile on Facebook, Whatsapp or Google, hackers can and do, extract a huge amount of personal data of your personal “online” life.
  • If you use the same password for multiple online accounts, you run the risk, if this password is hacked, of all your online accounts being compromised.
  • Using a personal name for an online account, the name of the city that you live in, the names of your children or your date of birth, give hackers vital clues for attempting to access your personal data.
  • For an average expert hacker, it is always easy to find passwords that are made up of words from the English vocabulary or other languages, using a basic technique called “brute force” or “dictionary” attacks.

What makes a password safe?

  1. A password at least 8 characters long.
  2. The password does not contain information that is easy to find online, such as the date of birth, the telephone number, your spouse’s name, the name of a pet, or a child’s name.
  3. The password does not contain words found in the dictionary.
  4. The password contains special characters like @ # $% ^ &, and numbers.
  5. The password uses a combination of uppercase and lowercase letters.

A trick that the experts use to create secure passwords:

Think of a phrase and use the first letters of the words in the phrase.

  • For example: “In South Africa, a barbecue is called a Braai!”
  • Take the first letters of each word and the password that is created is ISAabicaB!
  • This will be very difficult to guess, but easy to remember.
  • At this point, you can decide to make your the Google password is ISAabicaB!-G,  and Facebook ISAabicaB!-F and your university account  ISAabicaB!-US and so on.
  • There is already a capital letter and a special character (!), so you just need to add a number to finish off a good password like 9-ISAabicaB!-US (9 could be the month you created the password in – for example)

You will have already made your password a lot more difficult to hack, and it can be a lot of fun to create. 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.