%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 13 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R /I2 15 0 R /I3 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250715125615+00'00') /ModDate (D:20250715125615+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3306 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 78.170 521.469 668.564 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 78.170 l 565.984 78.170 l 565.984 745.984 l f 45.266 746.734 m 45.266 78.170 l 46.016 78.170 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(EXTRA LAYER OF SECURITY ADDED TO CAMPUS COMPUTERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(February 08,2021)] TJ ET BT 177.584 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 192.092 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it's essential to stay )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(informed of the various risks that exist on the internet if you want to stay safe online. Here's a breakdown of the basics:)] TJ ET BT 61.016 606.442 Td /F1 9.0 Tf [(Malware)] TJ ET BT 96.530 606.442 Td /F4 9.0 Tf [(, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(common type of online threat.)] TJ ET BT 61.016 575.464 Td /F1 9.0 Tf [(Ransomware)] TJ ET BT 117.032 575.464 Td /F4 9.0 Tf [( is an emerging form of malware that locks the user out of their files or their device, then demands an )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(anonymous online payment to restore access.)] TJ ET BT 61.016 544.486 Td /F1 9.0 Tf [(Adware)] TJ ET BT 93.524 544.486 Td /F4 9.0 Tf [( is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your )] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(behaviour online so it can target you with specific ads.)] TJ ET BT 61.016 513.508 Td /F1 9.0 Tf [(Spyware)] TJ ET BT 98.033 513.508 Td /F4 9.0 Tf [( is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(details and passwords.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.)] TJ ET BT 61.016 462.541 Td /F4 9.0 Tf [(You've probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop \(Figure 1\). Don't worry, this isn't a )] TJ ET BT 61.016 451.552 Td /F4 9.0 Tf [(brand-new type of malware. Stellenbosch University's IT department has added an extra layer of security to campus )] TJ ET BT 61.016 440.563 Td /F4 9.0 Tf [(computers.)] TJ ET BT 61.016 420.574 Td /F4 9.0 Tf [(Figure 1)] TJ ET q 57.000 0 0 69.000 61.016 340.376 cm /I1 Do Q BT 61.016 322.585 Td /F4 9.0 Tf [(Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the )] TJ ET BT 61.016 311.596 Td /F4 9.0 Tf [(current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart \(Figure )] TJ ET BT 61.016 300.607 Td /F4 9.0 Tf [(2\).)] TJ ET BT 61.016 280.618 Td /F4 9.0 Tf [(Figure 2)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 76 /Height 92 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 76 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 5185>> stream x\ktSǵF/ےmɶdlW` !Y-)I [+5Y -mr聾N&8i5$-4ʦI'8i`2`C#[3[XG6v[gyIsf={{F&uI$ Pp䶒\5jWi@B*- tO oi0G&yb^:HP!1Ji2t49_\ `N-S7$ܨ&_BBB+/z5=%oo)$ @BX844$WBV ~63;Z#~IL %#-l+~BBEzNJT"MK$ݓa͕8^}ڝϪX*qGfDmA1]H;b9%8R(7g4{d4CGFud”rN#ҧʋ0ҲYgtag7,.LONە̒XR27Ǽ[H`F,}pм +Id D+ՊېKʒu0LxM$^z2BG _ b$ԗ 0ⳋi1%9)&NS3$gV/glJIʍSsf'4_LDZd}n?1gMXi"BI]-H_)wҢNK2'-AQRX~cK/ydFi+I'pVkO:6^v;thP:4(jzިڬ '~Q$BS2w o2zu,]-, kj;lK+#Eܼ! p,^̟| A њ4H} ~w֝ ]9a9KRuNX 9xo=hvh_dU9" zc+|cKK q._3;b夾Ǽd J˩p/g- 4n;pS Pb/[38c^i`CDJ3U{23.!B`Lÿ yhv`KBiO%Υ`Y/REfDH %äX!. v+Ҍa!yy Z*lqWw.Iі^Z=sftЃLU29< q,_'?zWD_]DB9T"_udB9TJ]ۋ̞ cg N;4aXF!^4g%Aʲl)eYJYJ)Rʲl\_韟CĜ^&.N`Ǚˑ|)0h5lIp¼3|1:sLӇ@PշGC vNR.\q>Bzn\.gGw={`;iꫣs҄ v8sYʔR<(,YէBǛ9[5J F%)FJA6kdHU_q3GF*BP6Ɏks1QM&'N?4V vZvyk7?FU9C A!)&d>u1> -T,JcC?zdy)U4IVeѣӯ;pC C))sPEʫ.&q sL^}˩<~Tyť3ڎAeN`BI eӆ%եޑA&7' !O?;)B)e6v-\Z}Wd.˻%ސB _JUa8$RRtΔ/~?xV&M&q*WO0n^KДLYeYR69lO3C-H_ ycqL/{K\A F;_IҌE=ۤV4` 9 q4*54P+W *J5=oF&샍?Ku mWe7wZa9a5n* Xhw'8RE ijaYmrw7@H^zZA{3_fcp?z0؁!\hC\;!k[*m-J lt*#lp9IE,R*ƞySVزIͨPjӁ^=Gu}O~a]ຮSljP-Zni.{n-O2-YmdfC۪K7ͥ[n5qql cݲnYDVwBqkGv]OYgCߺ\ԊzltF"}*ηAU$I4sJm)C'3*gmG0>孚x?q .R_G­f[|ӹ-ƭ9}W`5pY6 /, եc~GX-~kZ~!m=J $_Ye|4PiZcg`~4QjҼkJ歷6>ZE}We. 9T um tr)dejRJʬ1, Z(5pM+a~TNa <5G^:Iw%)ң5ͿL^@ NJ5؟7l贄mG[+:s a:Tgs*+PizGҷA ӡNftzCLsRO A듊h5 YHgK(%l_ͥ0C*5 9z4b[? Gw]k>ኚh 0:$q@C'2_.D0N0NIvR f@ErPKƫf00(c#_x>)J J5tz U dswI$gWҤRQ@*2MHxrKT/gzqIq%jt?n\$Pr-K/X?y^Q1)ܺS{Ɋ=MZr#_pvp⦲ڀvSJʲ_X_8|X;[7G)\]H8AN3K'J/;O⮏[o١2L9+w=ʍǁ"S XSR/0w,+yi0La ػ0e*@uӠ%CQN",=oXs>,Ӟmy~vli+?e}=s}sy~cVkOCI vzdӰY)t_f@48R ]); "@t0#4gd3&Ju$ WXNa:J5-$@$+DPJbDE*(Չ!JOB A@W\3u,8cU!9WMt"@^d IB̂aըo?0BS-6̓ )(⠗2$td Y c`&iLt endstream endobj 13 0 obj << /Type /Page /Parent 3 0 R /Annots [ 17 0 R ] /Contents 14 0 R >> endobj 14 0 obj << /Length 1413 >> stream 0.153 0.153 0.153 rg 0.773 0.773 0.773 RG 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 458.539 521.469 299.445 re f 0.773 0.773 0.773 rg 45.266 458.539 m 566.734 458.539 l 565.984 459.289 l 46.016 459.289 l f 566.734 757.984 m 566.734 458.539 l 565.984 459.289 l 565.984 757.984 l f 45.266 757.984 m 45.266 458.539 l 46.016 459.289 l 46.016 757.984 l f 61.016 474.289 m 550.984 474.289 l 550.984 475.039 l 61.016 475.039 l f q 225.000 0 0 182.250 61.016 566.734 cm /I3 Do Q 0.153 0.153 0.153 rg BT 61.016 548.943 Td /F4 9.0 Tf [(This is because the malware will sync to your browsers profile and will be synced back to your device after it has been )] TJ ET BT 61.016 537.954 Td /F4 9.0 Tf [(removed. If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on )] TJ ET BT 61.016 526.965 Td /F4 9.0 Tf [(the )] TJ ET 0.373 0.169 0.255 rg BT 76.028 526.965 Td /F4 9.0 Tf [(ICT Partner Portal)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 76.028 525.814 m 148.550 525.814 l S 0.153 0.153 0.153 rg BT 148.550 526.965 Td /F4 9.0 Tf [( for a technician to assist with further remediation.)] TJ ET BT 367.438 506.976 Td /F4 9.0 Tf [([ARTICLE BY BRADLEY VAN DER VENTER])] TJ ET 0.400 0.400 0.400 rg BT 61.016 488.487 Td /F2 9.0 Tf [(Posted in:News,Notices,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET endstream endobj 15 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 515>> stream xA 0 =fy9뀟\- endstream endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 243 /SMask 15 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 31839>> stream xwt]ǙYU72^~D$, l===gwfgfsf{LmwOo-K,+ T(b3$2rjx EْaIwx$n}K}XU!Gbbių]Z*9B|W EKDb21:AQz.0뎩&&sgPB G1N侉pC۫~B]T}DkM=R#WjA-Yl0)j䗿P1낏>θDQ=kβ\Bay!SC]UKH;΍pJr﹗W QѹKsBHQa Mw.BmK1nKA SV$a yXA4}U=sPȶt^44ڗ.g7?d9_7[nWX!0&Kcdة!GR щMe*<BIJ|Md>" Db3jPoT~{FTd!ǂR8޶ݶlJ'Fl ޼־LfSv BB!HSQcPgMܗ˿8! EDAY7Bz .\y3Ô#,_B&*x@[[6OM‹8Ftx$B EAa.w₀MIIJt^;o2 Ҍ:߹~CiMZydX.L !`JC^" 9|aS'lKڃ? 2JcO0^ojGZ&=5S>] !_gRik}Aj"BDSٖ-O# V!hκE3T KN.Z#EAD3|u5i->8ξl9hHbK+cM+>I48־tu|Xz{`qQۢ|]=m6^ iڵ:,K6jsFh]z{M2  mKڱHSb̖<2K%$XVa^bY(eZ[5G.Z|z6GD N5n૪ђbW'xjc=id4U[,u%Dp s\e[h*F}en]R)bSs7Uqw7YhyHh+Ji-\F"\6@\ETEhh?F ùz evMYRZ[k7X!.\iiiQ}܇EbWq%@llV46i[KK{"+(Mv+傡AQQ}g c/a}bY``~^jLJZIJ'm[D*+mZ|smFDFKC.. yFg2|MMvO/9Ml\(z.A53 B_Yxk0\'{L@Q*w[lz\vFO$[XͯcVMĉ:Gs F6N+z.W:v:46CZ" ^:>wۃuGhTqmҲ[,Jg%EKhэĻoW,ͭB}(=o{m\2AbU[Z*#+Z"SC,g[DfǏ} ŬOt=#wS@R<00s\ (.hr3 e9׬BRo/qW NH=P%*쑃Ro!KwOt)R͹~Q,wbNJUz&8fH%Uk cGAz.D}:k'r9֮ffrWOis.e9; 5um CA5ײ@bg' ږ82+ie:h$h<$WƔhqHQ,ð-i{vnBX>iin>x߶l9+V:V2  C#)?ep7`UzTTFn4$ e"(--ƵzA\YQ(0.wyy_hlt-')dHe ^C!צ hXCxful`Rx`̸LEei`@RIv8 XHhT̾ݬcij47;:z+V&k8ζ=(Q}7FG ٷdȫ*hD KVU-NFvyxF_'茖`, +K=@uI; 禭|Mų]B:oJynJm0 .o;#uz*^zAOOڗnmRP`>56& W|N+Ů.RIz2ʉ?1 HѴӅ,X;o[[ZŲ "1 ıX>DGoY [[[ĖV)Zhh[v; iD! B7߰-^v˼56Ƹ+R;>*0!p˲cjd.Ay- 0q=6y-b{{ǝ;r_w}#Ӓ ->D;]ۗ-,%j$uߝw7]g_r7lFK%CR),K呰P?ϽiwLt`lj2%ݕxg.\7N.\ P}F> 3$۬[o'U55ep@OMÊ%T.\lm[iZM}]{sFXS^=K}=q<80;z.Ԓ-G~wW([Ƶ~ OF͔ڌ~<З?~lj X%P6;_Y%j,WWSV<88 cMC/vmKTjhU5cy+ _]CX `Y2)'Z!F WUM-Pq.\I[D 깜<4eC!C0JD7( !McE|n|~h  O|)Nyp"WUi22- ^@K&3:6|ef**z>Fl @Y,R_/4~X #T W"#( 4_UM;N3n7_]%IK&@q u, ) ERIFTۿ;u,I9 Y@g DiZE W`Y6J%Ţ<ЇU X@hR?ZΎ0;\?'l^`Οo_J/9aE,KY,F02T &fY"5#S|7[%l(d[z[S'G~/J4zYig0-*gN8gܿ!Ly .=3a\Po:k?(~ {%7)JxU2X*+?G;]RPSiL)c\+?mtwM1Ri}Ϛ+=Bp( k0gJe J 빜^('_"x=}z&2J)1t?@t=wPY,ˆ"ϵ8_;>gcg2z&D cK !Fd\qd8!D33V|-(Ǿ&&s\0d_B͓f&&s!EUiԳ&&&d̉9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB9TB94l'F;!i{9IJu'!z> w$_g3z6KU. Xd~3}V+F5ulCә!V3{vR [h|}|B>+z*A.tG ;&3ec0rM:rB t\zK"`]W"#QC2{?a F9/sQ,|n/#Df3uʏjZ3gQ,I7<V.s9@ du'!xv,B^)ɗHK Ӟum] 2~5MlOY,SCv[ljSR|QcBuͦO?Ʌ+ gmKmcelTňaP i(~? DK1^i8`YƲ,#~tB IRGZ& !d<>.eJب@h hTK%`(tJjJdKSQa\Vh>?(-w_U2iyhqh%]8%S'$5LZFP6;7^ BX!E utZ..(#FUVbIŠ f,uexH/`HK$DZ @i@xY41 -P1( pJ-*>% zs' iCKʾDzS:6xDQ Y.RTI~&$McE){d**DK%++%ݿ\z1 L BW;Vݝٿ׺hqfn(׵ B=olS##0e?x={ú;rh_s]wķf[.pd]%>x/#G,k_*wp'|ryou&2wJk5+?GYm;ܑCJ4WV]%sCcq\l G; ?oRN鏝6xn5+Rig/]|[jl,5d[+nڊKVdKCc[=Z.sZ*yITO7SI}旎k+Cȯ}?7K/vo>ouOO}@ У₶sZ"=҅ssΝS>yXm CO| {v>sZB)a䗿p|1jB b!x?@yI5[[K)(]U~J ,+шקbI@~ W`̀ 6D}:rd޾T<}q{ACv|8o<@t 1^a`E%!rӖ%TĻo&67;XS;?JuuXUn%-[A ek;oGζݳb ڀR}ֹÏϟK}~❷@QTb-ԒC^yY~''?ܞxWbUQF)ŵZqA2g<4DV9X\kji:QE5=ʟ찵/.^R:=Y?hd7ovznնxJ~?`IkFǚF=ÕU)%'m =[o%nf낅ֶ6>4捏D%XSLXSȰ0oλKSڹC\FW/3UBiRυ}XQ(EL>)Jl]\^lmE?k e֧v~=|r]2jD-Ħ&yh({'pЭmBO|@41Db**BO|Ghht*o/| al8wضiƹ~gj"Q:%7_XFo(Pjbso^mrypt[&&6J܆$ٖsp™3+mK Np~?R;A 3YQ:Az.S"rWF 6 rM9VM@S0r9=@yxà6J`]R6kxLK$EaEGUXW>) ҌmRDi)`\nm ĦٳJdJkXU^|^KVٗd~JXX3wܰqj wY߱jsAli44k8yRvXWB\"ٌ\|=<΢X  yd>uBmEyK)Ҩ M: iiFa\刮cY,X<,wAz]F4CYD.A,] B BbU:%X!B(r!  :@,u1hln Yƺp}rЀPS HY,# d}~.z)ͶUp0_YyEz Pv;"5@@\ v=76<(KK i-ϣDQxHQȰ@㑔8ODŋgccw,vuN'4E& VkmY-z<ݙx7m}I3l\) :gW'xVY(rR.S1_u~M^(Jn[W).ӈ&?@眫^@HVq P]sicH4 1uB"DYbK+SQ,}r-(WW3yqA}J.\ȇD(պpPE[)b>u|eMf.׵yBi[N;\0d[cBy15. 4t3S\8 XgB3g X 9&&_M9@.\dHRљ,^pt<~zIypжxɬ;~U]'uHEP[[ӻvZ .b]vv5K}Ėl[#C'8NŮ.J-M!1՚DM 孭MZJtĹ.d%i.OkߐZ=[o{E'rbXmwB&U:z&|K7cE)>hL6sz۲ضW':B L[o>h?4/V?%$ٷ'5DR6g9ls?\>LY"+{gz.} c-Ւ VS\RC(k}D}:wи iv85Bq_U!4,y?]pp%Q|XG (EK!NjxL,SA<d~D@ CK&NQeҴQ*i8xaYRc1.O/] QCjeLEEy֚Jvir{Mٖ-gOEyyJbѐJ\ѹv4[SВ⹳\(l_;m pX깠g3|e"@sG{u-o=yZd,M#QܮFbsKT-"nJ"``ijRZ"ak_*kDѺgtqBᡟX?we E3?.tA,Wf-݈j\wwCc/$.i/=+^omK .8~jinr2ӿ45W_BI}nTDZ歈e&y[K& Bx<p1l])b>ǚ5Ȱ::fJY XI蹜Q(pMa$XKŌg0J纥Ǫ|l !RsGep<22l_x N^y|ADB0y5)mr?.h tjbƛł%iƒ (R_O˖o‡e!*Ѩ"3'1LhE3{Ķ8WW[.ٝxs}2£(VNΜ-eOЈEF`+^y5Z2!:7\#6;?ub낶̾^a}>6{EXq y9zs0 4)f!,5mг=\nٷ2.WGFKcO^OJz;#7=\6Hr)]QQWzT Wږ.㫪h!C[Q6+UU%69v%+h-3|qDU2{bF{nŹ~iߧe:׮/v3׆@??C5kt-]Ƈ+}}Y/1aq3 ) D&3 Cfh D*uwYZZy 7aC zA4h22x:>el Ů.5Fl]ÈX־4w} ki[hsedxW8yB-\SBmQ6F @ >?y()/\:ĸ\|u-8jcR<эq ȳ 0~!ɨ1 _C,kX\xKfָą+1_gVJt+ ŲXL)UxKK<1u$6rFhz`)x&ABpyF,O1mD ø\q>nm[ٿ/ֶB隿\(|yhrijj!=U|Oe!АWW_:5!?X !*q qi  IxϜ0\F&g&(,46UGkw{!wo7 (%d>y}R<{VFWN(䋝[.ljbJSBm]rcGېRp^*+`PϤ!M+CF.Gt]!S^LYL ݛEy*wpdXTRɲ7yhPv-2z:=t(W^G})BhJŢpz.¤!VU#òL۝ߏhs˭|0<iBsV_p:6j*_sͺbOZg)\< R0^gB-[.޽(hI ݵzBaOU>^ub{9- M6^ (*k'm+hWߞ病/J !8֮|..ܴպpQy-Yi} $B]= A)[OiwbXv(fc:vn sf\0&̫MͬW1!EsQ*-p0lA|U <(eɃbqn WY i{f-eyn}G[5P4P(: /& &W%AT` )jbXQ E]Η%QTx /vb&LHQ& 6L}V&.[^.3Eb3 ռ|G0# PW,G_Zhw>:޾_.>E S47/itvSUmhhDkZKR$)L2tf|J%):}Ξ;Dq^oo: G\WTjj*OjWq\YBH*I$S QVWYG⪢z<9ӽ}nXo[T&٬^_CӚ'L&+D:y5MD!O-T*L0&_fs޲ee~``v ZtT*c^\5 Jɴ(Z J4d|eMSu``0 nA bt4f.7l>O D^AJ%i,TcX,< YxWZk8l8NjD:4]dU;lD*6CQjX"_(lրߋ1%(f٬bF+KLvNU2B0ͻ+<Ǎ( |>6/.¥iz6(*XEiZXIX,^*.O!1Ǔ;v  MT&HZEccq@0h{>afz(!ehfY9]UM<ӝH$*C>pשS]{ 75}@UUɵ׬mkkٳgR8r'Nзw!eO>(⡃>z8ΛꪷoߕNgec?0[ʲslkyPxs{ & qSΟݻcBأi:dK:| NXppɒ;E"Q@@2xӖ͙ln۶t]iܹy3Xu&)zT煞}Z,ϱv(7A+Wϛ8Ƹ{TU[_'6oڰhQjǎ"3Ys[1o~""p\n׶mf29alq8DZ˖.fXzt4GS錦jskKsôBa8fb{k;i[ljj߿4M|oS'N(J6lXG{Eex8R[WT4cY*K/`q,[]DGMV\z}C_z*Lҝw<E /i7pX,~' $IV.s8xPȿrҎ{ljFco}֭Fmܾ}W6]׏?)Z-[nIJ qv~/P}@Twgfef*+7 ۶mq^}O8?ݯV+Gf}WƁ>?s[߶mcw /o=żwz[ɤ_?pl666 ]kmj5@xKZnܸU\fs^'do` \ _0̙K.57׎Nҳ6Y75^y9Nx2*XLG*-t$- 9zvVV::/]jrm7;^R!^ܳO;ECc?rc8c~so~k;o>Ƒё N EvزiSÏ:A/xz{wπd̥69EMMo,//;wlٻg{'_ٷoW|f\.vZ;wn4NE+*J׭vO=e||I3UEE7ޭnX\쮭Ͼ[67nۺ!˽AE96ݦP(Hm6NM&CCoRB!dDL6˪T h(f9" /++p {l788/ L(^~]Q%\n SS`0X,0r9-Qj>EoS %gHi5l6'Je㽽J3 ɅElW+*TJ~%?tw=wes76dFbhp{ ia`x_P_P{{W6UlVTUF>2:hZf9^ύOLT:6aMu޹}Z V1iYzv-FRzѠz] `ЉE֩鹁X4x"Xb1UVt:mQu> P]Ui|ŭ|s0 zREӔJPڊ,%%Fr9C#Wsss LVe2Fw(KE!@P A!$A fqUe'&{䡃{kk*}l>OI[**|g\}X6_a|.KFEQd]]塃Ok*A*<(Z,7|bzjՕeL^Kcy6q6l0]ow%|>)8=F|:дlu4388RWW؃5 [6/[:55ZblܺuCYY1 0Qd2%(dlEZFEcq#L$S4-3 DB@"XGQX(B˃ϧ| $A@Q Mvmz@&C8e2t!IIg8iZI! (m(c(E B?otZ\N/CaxAg2Yrr,S;{.\l:|ijpgl[j(Qr7ۻZZn{橺P(,64}TV%B K KGB j?R*Q鴹9M$B'Lƍ[uuU&?ofj 0PTuAeEVD2Ĕfx7nv {|>/R( PFp?q|UEQ_Y1aC;000l0A{s.gX,166YQ m Fch4*uw;E2g7nv֯.YrbjJViABDS!L3LSsNೳd2k4ꓧΫ)va2#E*Ek*ϞD(AiyK!㝫xׯ+ZRNt `JJ<7ov?qčhpy9<2FQ㜘Z*4(/AKGw"dho着*p:?#AN/w c\./j4P(RlCО `y~\˱TRGoi0x~r!'8~I=@ XpayRB TH7|!{R,T'-Sl+$)m6]$ɜ4øB#Fe'dY"!u%B '"X JH"PBbyEH$G&Y]<)6ֹ LMCO'MMd%L3LwM-. dzfԩd I"J$&B2J&S vR` 0_dW/5 S. gp8N3 N\Ԕy\ }5Lvzh)T2,~L%'c2{Gɽu"rW寸I\vY)D裏}k#Gp<˱d;+Z/,cEYq V\Ok 8jjd^}A.Ud23P^^h+b?;0 p0F!fF.э(;b8òl_M֯S*}}CccA7ج@ 8NOK}ŴM (25=jk*Cc*rqq꿩:"vmu##F~}ch ! 7k4ƏOL_ڪoXըs\ީIa,8&Ɂ3L&LvttPk͛ppPݴqf?08Bt}}^eYvaaQ…&\nͩTv>Uה>J;8jٹl.: uu1Ltd&&FæM ۽ӳZz}cV"da`04<<:*FS*ƺ厚 =&SQ3/\vA7Y,i{n]-|Vϕ@Pt`sl*#I2fslUU,X޾!Z%eNMOKJp` M]Ǖ篷ڽ{^EW} nig=ժ7ǧ z.!duTA&ąVhuucS2tbmDgޙH2A6oYesbjn~` =;dM&#'?}}hx,O㉺d-aI*"@<8Nh,q}q1|<`,%:H{Ѩ(UJAFb /1;VeJ)z-9yj6g^Z 0MzۊS33e>b0 w+rGiF0E y2ZXb8,E+xg'LO{D"9=3D9AL6t:f.-ؾ Bh*mW00099EEP_[WW p\RCDQb1:EzFyN$S闿l[ۭ6_ÑXK ;/]jY0 Ģd2e1m6ˁ{45sE  TfliLClUSA"GF'ZM%VQ1fdxXXyy|6+[& | . "Fd2ByР׹EѨs9w>ܿoW}}͹sW(Jn]- v:ΟcBA.W5CC#y]QPȟ{n"Qׯ{~Mi4Gl慅E͢RP=uB)g KǵZM[[| :3g/ @hlO3 DP ʱ>ը-V֭.\h*)qc&ێ yĉk"+a4T*,c;;`2N+**NZ˲sxT*Lf#ŰBNx-,#-nkHē A 9^ ¡PDC4"L`AD a% Rt(mA0hd2 ˲z XLu:f1eZ=7 !ID{[_W5Z ï~|uE~Y,^{63fܹhlㆆu,BDV}ʭ_89PU ->'!y$ >y.ѴZa2h$n6:]A/ kGD'Xc$B %$Ik$B 5F#PBbD(!H"Xc$JH1%$Ik$B 5F#PBbyU14xOX rޘWE6P(_V8|>S!% A0 3LēF6 ]~RZ-ⲓ_%$3o-RjHDZ%!"uGIdMEzJH1%$;HGJH|mD(!HчQAO!jRQT*M8[H|Ez>: s;S3LfphzL>ϭ2eϝ:66T+C? pM6L&h2oy/;Ti-gj{CC(KNΜ;T*B{6_m]HJd WRh+NqR%JіU;FˀMD|14 m6DH$^~"gN8 ]xpLww?c`E={V'N zrrZ8hsMZ955xCCԌ\A~7tX,NӲwz!?CȕhZx~M֯~wEd88P*<'I |ejw3G7oj(yM&ի48EPd۶nD?T 󅞪 4-i8Ah-FiQrujʟg9V]U3 EJs_ATTT\|ɓ4M?S$((]XAx5ռ.Z&̥L&+FrSl6P*1 MM$>CK(K:ɱ,PGA2iP0LV4  ,Q@.:-(8巔<,L&Kilm 0!" q4MpԊ=E$!DDFQ8Pj j@V*C*Nb,!xȾýC< &V>wjYYqssUUK;/wf I @P)p6:u2nnn3.53L@j:;{nu]򒖖(*L6[[S100LQT.yA藊5mVbK i2'&fJK*RAl!q$I'HCa\edFMN;ٽg +f?{UVUv77]o޻EQB;TJDF jWe2_Wג$+*U A:n=7:gj*,M[[MFpPYU 0DQduuU@D!d$ar9o_͛̽wf ڂ`8FI0 A$0 Q$ըyRbeh,(&@!@ON8ϗ+?384\׽u1" $E DQ\:#$IHx4YM v9.ǽHw_v+gc:/xP/ kzA<ޱ}ӎV?񳇞~Ӆ$?<ϯfEcS. V1q2l.^HVm+8Ѩ/*(XQE*rNej5(@kviW*dj5oPv5u0@Q;6Q jE6+(ڬv;rY"(+jՅ71vLѨE6 UJF:YbJRZmMbpNU*սB-L & ,ˊfdm% aA>%)wr>ԟwYDp @qeEN'&&lLxaYvqqnc_#z6}聙v1?ZjӒz`Aό!yQ<H*($J|H"Xc$JH1;C -$z$$6HO‡@zJշIeL&#YHH"\(4J:#_'(Z,m"E%ϰ\fkO,V GBbD(!H"Xc$JH1%$Ik$B 5F#PBbD(!H"Xc$JH1%$ɋ Cl6d:#k"aY6N?^`84@I_< MMMƏw A8+//x<+ ! #9LʵcEX,{uim۞A@jvDE!T*&i3Xy^P,iH4O^:lv'$!D#PBbD(!H"Xc$JH1#B<yC T:fKf(_ip烩4 \4 *_ V9 C|`S)B*NZ$G*#"p8_R)'jk+{XSSanKC ~\((/%5A~B"7i_tF'aZ=}EQ!7?+$J ݎB%Zn(s$E swx 嶭:Ξgbwau2kӎIkLe2 O_:v||(mY6?22CQqA7\.J1 uڲ1,E^bfs*baa10nq"GGSlE=)<v ·F՗_HS#pTUh64n7޵m Uex6M>_1aҩta ?9EmQUt #,61? vuaVUUfl6b<%p4]U]Vd ?565Iyrqlǎ-JH+:.\l*++Y\ ~絧̥?@s!GAـB78:08h.{CɨT|,56Ŧ@0K[pO;o>xp1Zi_zХ(]W[/_fSԟ~7o F\.C8yNJ)jv⟙;yܫ GBWwWxE w?JWob? _l<,Ik0Ó7o[l.ѱKKkSS3?--ml.k/|^^ L\._^qV*ͼ z'?}.㣏NۋmƆD2UU]W166}C55_gv۹sϜicCQ14z]iihmk8q\IgphzѨ߾}6onid2R_꭛׭NH8W'bFۭݻj>yjAPYz8[Yy!h$w4-;|ȱcۯP.xp199; B`n_ ~"{u*N;;7ޑ[zJd2R)7 $I:muu\.:p8r%%Ag1&&gk z]xv讝[k4C֛4gH$v *s8lX[[8ᱺ*F !dԌa+)PUTdZ--T zڪ?ot'{wtIrB~j333Gqy$7oDR)u%~a3CCCssskNJ DS(BSN}]L&aj&0AD wBhrJd2px5 Q!dZ^DEʯgitTBbD(!H"Xc$JH1wDWxY5L Arr%!wgE'm7c >O !!x`8 endstream endobj 17 0 obj << /Type /Annot /Subtype /Link /A 18 0 R /Border [0 0 0] /H /I /Rect [ 76.0277 526.1326 148.5497 535.2901 ] >> endobj 18 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/plugins/servlet/theme/portal/6) >> endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000361 00000 n 0000000398 00000 n 0000000536 00000 n 0000000599 00000 n 0000003957 00000 n 0000004069 00000 n 0000004184 00000 n 0000004304 00000 n 0000004412 00000 n 0000009839 00000 n 0000009923 00000 n 0000011389 00000 n 0000012149 00000 n 0000044248 00000 n 0000044375 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 44492 %%EOF Tips « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Tips

Cybersecurity Awareness Month: Common passwords

Wednesday, October 3rd, 2018

The past two years have been particularly devastating for data security worldwide, with a number of well-publicised hacks, data breaches and extortion attempts.

Annually SplashData publishes a list of the most common passwords. The list is created using data from more than five million passwords that were leaked by hackers in 2018 and with a quick glance at the list, one thing is clear – we do not learn from our mistakes.

People continue to use easy-to-guess passwords to protect their information. For example, “123456” and “password” retain their top two spots on the list—for the fifth consecutive year and variations of these two “worst passwords” make up six of the remaining passwords on the list.

SplashData estimates almost 10% of people have used at least one of the 25 worst passwords on this year’s list, and nearly 3% of people have used the worst password – 123456.

Here is the list of the top 10 passwords of 2018:

  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. 12345
  6. 123456789
  7. letmein
  8. 1234567
  9. football
  10. iloveyou

Another typical example is 1q2w3e4r5t.  Although it seems very cryptic, one look at a computer keyboard and it’s easy to guess.

Not so clever passsword

It is a sobering fact that most people still underestimate the importance of having a secure password, and still make mistake to use simple words or numbers as a password.

“Passwords are the only control you have to secure your data with most systems these days. If your password is easily guessed by someone, then the person essentially becomes you. Use the same password across services and devices, and they can take over your digital identity.” Shaun Murphy, CEO of SNDR.

In the next post of our Cyber Aware Month series, we look at how to create a strong password you can remember.

 

Before you resign or retire …

Tuesday, July 31st, 2018

You’ve packed up your office, said goodbye to your colleagues and you are ready for your new job. But what happens to your sun email address, your data or any electronic services you used while working at Stellenbosch University? We have a few tips and instructions. 

As soon as your active role as staff expires, all your electronic services also terminate. This process is necessary to maintain a healthy and secure network and to ensure that unused, dormant accounts are not used for nefarious purposes by cybercriminals.

In other words, from the date when your service at SU is terminated, you no longer have an active role at the university and you can no longer use university services. In this event, you will receive an email from helpinfo@sun.ac.za informing you that your username will expire.

To ensure that you are prepared in advance, we also suggest you do the following at least three months before you leave the university:

  1. Create a new email address for yourself (if you don’t have one already) There are various options, for example, Gmail or Yahoo.
  2. Activate your Out of Office function on you sun.ac.za Outlook mailbox and indicate in the message what your new email address is, in case someone needs to contact you. 
  3. If you use your @sun address for your banking, Facebook, DSTV or iCloud accounts or any other services or social media, change it to your new email address. We would also like to urge you to keep your work-related and private emails separate. Rather create a private email address for your personal correspondence.
  4. If you have any personal data on your electronic work devices or network storage (G: or H: drive), remove it and store it on your own external hard drive or online cloud storage, for example, Google Drive or OneDrive
  5. Make sure that your relevant work-related data is accessible for further usage by your colleagues and the university after you leave. However, do NOT give your password to colleagues when you leave the university as this poses a security risk.
  6. If you need any assistance, contact Information Technology and one of our technicians can assist you.

Students who are graduating or terminating their studies can find the necessary information on this pamphlet compiled by the IT HUB.

Clear the clutter

Thursday, April 26th, 2018

In June 2016 we were introduced to Office365, but do we really know how all the functions of this online mail service work?

One such a function is the “Clutter Folder”. 

We have had many students (and some staff) who have reported that “email was missing” or that they were not receiving mail sent to them by mailing lists. While we initially thought that this was caused by users deleting mail or a problem with the email servers, an investigation revealed that in many cases the Clutter folder was the culprit. 

As it was originally designed, the Clutter folder was supposed to help users filter low-priority email, saving time for more important messages. Supposedly, the email server would keep track of the email users read and the ones they didn’t and put them into the Clutter folder. For all new students, as well as staff, the mailbox feature “Clutter” is turned on. Once it is turned on, Clutter is automatic.

Because mail is left unread for a couple of days, Outlook 2016 starts sending a lot of mail to the Clutter Folder, leaving students to complain that mail is not being delivered and “important mail is missing”. All the “missing” mail is still there. It is just in the Clutter Folder.

The best solution is to disable the Clutter folder entirely, so unread mail is not sent there. Here is how to do it:

  1. Sign in to Outlook Web Access (http://www.sun.ac.za/webmail)
  2. In the top right-hand corner, click the small cog icon. A sidebar will appear.
  3. Near the bottom of the sidebar is a heading saying My App Settings.
  4. Click Mail underneath this and you will be taken to the Mail Options page.
  5. On the left menu, underneath the Automatic Processing menu item, click Clutter.
  6. Uncheck the box that says Separate items identified as clutter
  7. Click the Save button at the top of the page.

Once the Clutter filter has been disabled, you can then move all your “missing” mail in the Clutter Folder to your Inbox. 

 

[Information supplied by David Wiles]

 

Protect your personal information

Monday, January 29th, 2018

Data Privacy Day, occurring every year on 28 January, is an international effort to empower individuals and business to respect privacy, safeguard data and enable trust. 

Over the past year the world saw many extensive data breaches across the world. This has accentuated the necessity for creating a greater awareness of protecting information. 

But why should we care about our information?

We are entering the next generation of technological advancement like the Internet of Things, which will connect devices in our schools, home and workplaces. This provides many opportunities, but consumers will have to learn to protect and secure their information. Your devices make it easy to connect to the world around you, but they can also track a lot of information about you and your family. 

How much information do you share online daily? We spend most of our day on the internet where all our actions are tracked and collected by the devices we use. This data is stored indefinitely and can be used at any time. 

The National Cyber Security Alliance in the United States have the following tips:

  1. Personal info is like money: value it, protect it. 
    Be thoughtful about who gets your information and how it’s collected through apps and websites. Delete unused apps, update others and review your app permissions.
  2. Share with care.
    Think before posting about yourself and others online. Review your social network friends and contact lists regularly.
  3. Own your online presence.
    Set the privacy and security settings on websites and apps. You can share information with only friends and family.
  4. Lock down your login.
    Make sure your accounts are secure. Don’t use a password only for bank accounts, email and social media. Use two-step authentication, bio-metrics or security keys.
  5. Keep a clean machine.
    Keep your software, operating systems (mobile and PC), anti-virus and apps updated to prevent data loss, infections and malware.
  6. Apply the golden rule. 
    Post only about others as you would have them post about you.
  7. Secure your devices.
    Every device should be secured with a password or strong authentication – finger swipe, facial recognition, etc. Imagine what someone could do with the information on your device if it got lost?
  8. Think before you app.
    Information about you, such as the games you like to play, your contact lists, where you shop and your location has tremendous value. Apps collect this information. A recent example is activity-tracking app, Strava’s privacy issue. 

FACT AND STATISTICS

  • 41% of Americans have been personally subjected to harassing behaviour online and one in five (18%) has been subjected to particularly severe forms of harassment online. 
  • 82% of cyber-stalkers use social media to find out where their potential victims live, where they go to school, etc.
  • Four in five US physicians have had cyber-attacks in their practices. Keep in mind that medical and health information is among the most sensitive and personal information about people. 

 

[SOURCE: https://staysafeonline.org and www.wikipedia.org]

OneDrive: 5TB just for you

Monday, July 31st, 2017

Since June staff members have full access to the online Office365 applications. Besides Outlook email, SharePoint Online, access to the MS Office apps (for example Word, Excel, PowerPoint, etc.) and being able to download Office 2016, there is one significant advantage of using the Office365 suite – OneDrive.

OneDrive provides 5TB of cloud storage space for each staff member and student. This means you now have ample space to store your documents and your data will be available from anywhere, anytime, on any device with an internet connection.

What are the advantages of cloud services? 

  • More storage space available, up to 5TB on OneDrive and 50GB on Outlook.
  • Your data is available from anywhere, anytime, on any device. You’ll always have access to your data if you have an internet connection.
  • Your information is also safely stored, even if you lose one of your devices.  

What are the disadvantages of cloud services?  

  • Familiarise yourself with copyright regulations. Make sure you know what you are allowed to store and share online.  SU copyright agreements do not extend to storing of documents protected under the copyright law on OneDrive for business or any other public store space.
  • You are entirely responsible for your own information. Be careful who you give rights and access to, as it will compromise your information if it’s visible to other people.
  • You are responsible for synchronisation between online and local data. Synchronisation between online and local information needs to be set up correctly and done on a regular basis.
  • Keep in mind that access to cloud services when on campus will not incur any costs, but if you work from home your own data will be utilised.
  • It is very important that you keep your private usernames, passwords and information separate from your official work, to prevent your data from getting mixed up.
  • Having access to the cloud from any computer makes your digital identification vulnerable, do not use computers you do not trust to access your cloud services.

What if I have been using OneDrive personal, Dropbox and other cloud storage options? 

You can keep on using them, but it is very important that you only use these storage options for your personal data.

OneDrive for business and SharePoint online are available under the US MS Licence agreement for storage and sharing of institutional data. The storage and sharing of institutional data are not allowed on Dropbox, OneDrive personal or any other cloud storage. 

How do I get access to my OneDrive storage space?

All staff automatically has access to OneDrive. Log on to Office365 with your email address and password. OneDrive is also accessible via the portal by clicking on the Office365 link or searching for Office365 in the search field.

IMPORTANT:

  • When using cloud-based services, you have to keep your private and work usernames, passwords and data separate. Never use the same username for private and work email accounts, storage spaces and applications.
  • SU copyright agreements do not extend to storing and sharing of documents protected under the copyright law on OneDrive for business, SharePoint online or any other public store spaces.

 

 

If you have any questions, please let us know by logging a request on ServiceNow or calling our Service Desk at 808 4367. For more information on the Office365 package, please consult our FAQs or have a look at the Office365 training videos.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.