%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 40 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250720070529+00'00') /ModDate (D:20250720070529+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R 24 0 R 26 0 R 28 0 R 30 0 R 32 0 R 34 0 R 36 0 R 38 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10655 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 209.291 521.469 537.443 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 209.666 520.719 536.693 re S 0.773 0.773 0.773 rg 61.016 225.041 m 550.984 225.041 l 550.984 225.791 l 61.016 225.791 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WHY IS CYBER SECURITY IMPORTANT?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(the practice of guaranteeing confidentiality, integrity, and availability of information.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(someone elses system. Knowing how to protect the information that you have stored is of high importance not just for an )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(individual but for an organisation and those in it.)] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(Did you know that:)] TJ ET 0.153 0.153 0.153 RG 85.866 536.313 m 85.866 536.725 85.696 537.135 85.404 537.427 c 85.113 537.718 84.703 537.888 84.291 537.888 c 83.878 537.888 83.469 537.718 83.177 537.427 c 82.885 537.135 82.716 536.725 82.716 536.313 c 82.716 535.901 82.885 535.491 83.177 535.199 c 83.469 534.908 83.878 534.738 84.291 534.738 c 84.703 534.738 85.113 534.908 85.404 535.199 c 85.696 535.491 85.866 535.901 85.866 536.313 c f BT 91.016 533.497 Td /F4 9.0 Tf [(As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2)] TJ ET 85.866 525.324 m 85.866 525.736 85.696 526.146 85.404 526.438 c 85.113 526.729 84.703 526.899 84.291 526.899 c 83.878 526.899 83.469 526.729 83.177 526.438 c 82.885 526.146 82.716 525.736 82.716 525.324 c 82.716 524.912 82.885 524.502 83.177 524.210 c 83.469 523.919 83.878 523.749 84.291 523.749 c 84.703 523.749 85.113 523.919 85.404 524.210 c 85.696 524.502 85.866 524.912 85.866 525.324 c f BT 91.016 522.508 Td /F4 9.0 Tf [(43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began)] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 502.519 Td /F4 9.0 Tf [(here)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 214.592 501.368 m 232.601 501.368 l S 0.153 0.153 0.153 rg BT 232.601 502.519 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(The US government's Cybersecurity and Infrastructure Security )] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(Agency has made a collection of tip sheets available for use. )] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(These downloadable PDF documents contain all the information )] TJ ET BT 61.016 449.563 Td /F4 9.0 Tf [(you need to protect yourself from cyber security risks in a )] TJ ET BT 61.016 438.574 Td /F4 9.0 Tf [(convenient, compact format.)] TJ ET 0.153 0.153 0.153 RG 85.866 421.401 m 85.866 421.813 85.696 422.223 85.404 422.515 c 85.113 422.806 84.703 422.976 84.291 422.976 c 83.878 422.976 83.469 422.806 83.177 422.515 c 82.885 422.223 82.716 421.813 82.716 421.401 c 82.716 420.989 82.885 420.579 83.177 420.287 c 83.469 419.996 83.878 419.826 84.291 419.826 c 84.703 419.826 85.113 419.996 85.404 420.287 c 85.696 420.579 85.866 420.989 85.866 421.401 c f 0.373 0.169 0.255 rg BT 91.016 418.585 Td /F4 9.0 Tf [(Cyber security starts with you)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 417.434 m 208.547 417.434 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 410.412 m 85.866 410.824 85.696 411.234 85.404 411.526 c 85.113 411.817 84.703 411.987 84.291 411.987 c 83.878 411.987 83.469 411.817 83.177 411.526 c 82.885 411.234 82.716 410.824 82.716 410.412 c 82.716 410.000 82.885 409.590 83.177 409.298 c 83.469 409.007 83.878 408.837 84.291 408.837 c 84.703 408.837 85.113 409.007 85.404 409.298 c 85.696 409.590 85.866 410.000 85.866 410.412 c f 0.373 0.169 0.255 rg BT 91.016 407.596 Td /F4 9.0 Tf [(Creating strong passwords)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 406.445 m 198.053 406.445 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 399.423 m 85.866 399.835 85.696 400.245 85.404 400.537 c 85.113 400.828 84.703 400.998 84.291 400.998 c 83.878 400.998 83.469 400.828 83.177 400.537 c 82.885 400.245 82.716 399.835 82.716 399.423 c 82.716 399.011 82.885 398.601 83.177 398.309 c 83.469 398.018 83.878 397.848 84.291 397.848 c 84.703 397.848 85.113 398.018 85.404 398.309 c 85.696 398.601 85.866 399.011 85.866 399.423 c f 0.373 0.169 0.255 rg BT 91.016 396.607 Td /F4 9.0 Tf [(Cyber security at the office)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 395.456 m 197.558 395.456 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 388.434 m 85.866 388.846 85.696 389.256 85.404 389.548 c 85.113 389.839 84.703 390.009 84.291 390.009 c 83.878 390.009 83.469 389.839 83.177 389.548 c 82.885 389.256 82.716 388.846 82.716 388.434 c 82.716 388.022 82.885 387.612 83.177 387.320 c 83.469 387.029 83.878 386.859 84.291 386.859 c 84.703 386.859 85.113 387.029 85.404 387.320 c 85.696 387.612 85.866 388.022 85.866 388.434 c f 0.373 0.169 0.255 rg BT 91.016 385.618 Td /F4 9.0 Tf [(Identity theft and internet scams)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 384.467 m 218.582 384.467 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 377.445 m 85.866 377.857 85.696 378.267 85.404 378.559 c 85.113 378.850 84.703 379.020 84.291 379.020 c 83.878 379.020 83.469 378.850 83.177 378.559 c 82.885 378.267 82.716 377.857 82.716 377.445 c 82.716 377.033 82.885 376.623 83.177 376.331 c 83.469 376.040 83.878 375.870 84.291 375.870 c 84.703 375.870 85.113 376.040 85.404 376.331 c 85.696 376.623 85.866 377.033 85.866 377.445 c f 0.373 0.169 0.255 rg BT 91.016 374.629 Td /F4 9.0 Tf [(MFA \(Multi-factor authentication\))] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 373.478 m 221.552 373.478 l S 0.153 0.153 0.153 rg BT 91.016 363.640 Td /F4 9.0 Tf [(Also read more on MFA for Stellenbosch University staff )] TJ ET BT 91.016 352.651 Td /F4 9.0 Tf [(and students )] TJ ET 0.373 0.169 0.255 rg BT 145.052 352.651 Td /F4 9.0 Tf [(on our blog)] TJ ET 0.18 w 0 J [ ] 0 d 145.052 351.500 m 190.079 351.500 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 344.478 m 85.866 344.890 85.696 345.300 85.404 345.592 c 85.113 345.883 84.703 346.053 84.291 346.053 c 83.878 346.053 83.469 345.883 83.177 345.592 c 82.885 345.300 82.716 344.890 82.716 344.478 c 82.716 344.066 82.885 343.656 83.177 343.364 c 83.469 343.073 83.878 342.903 84.291 342.903 c 84.703 342.903 85.113 343.073 85.404 343.364 c 85.696 343.656 85.866 344.066 85.866 344.478 c f 0.373 0.169 0.255 rg BT 91.016 341.662 Td /F4 9.0 Tf [(Online privacy)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 340.511 m 148.031 340.511 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 333.489 m 85.866 333.901 85.696 334.311 85.404 334.603 c 85.113 334.894 84.703 335.064 84.291 335.064 c 83.878 335.064 83.469 334.894 83.177 334.603 c 82.885 334.311 82.716 333.901 82.716 333.489 c 82.716 333.077 82.885 332.667 83.177 332.375 c 83.469 332.084 83.878 331.914 84.291 331.914 c 84.703 331.914 85.113 332.084 85.404 332.375 c 85.696 332.667 85.866 333.077 85.866 333.489 c f 0.373 0.169 0.255 rg BT 91.016 330.673 Td /F4 9.0 Tf [(Phishing and spoofing)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 329.522 m 179.567 329.522 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 322.500 m 85.866 322.912 85.696 323.322 85.404 323.614 c 85.113 323.905 84.703 324.075 84.291 324.075 c 83.878 324.075 83.469 323.905 83.177 323.614 c 82.885 323.322 82.716 322.912 82.716 322.500 c 82.716 322.088 82.885 321.678 83.177 321.386 c 83.469 321.095 83.878 320.925 84.291 320.925 c 84.703 320.925 85.113 321.095 85.404 321.386 c 85.696 321.678 85.866 322.088 85.866 322.500 c f 0.373 0.169 0.255 rg BT 91.016 319.684 Td /F4 9.0 Tf [(Protecting your digital home)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 318.533 m 202.562 318.533 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 311.511 m 85.866 311.923 85.696 312.333 85.404 312.625 c 85.113 312.916 84.703 313.086 84.291 313.086 c 83.878 313.086 83.469 312.916 83.177 312.625 c 82.885 312.333 82.716 311.923 82.716 311.511 c 82.716 311.099 82.885 310.689 83.177 310.397 c 83.469 310.106 83.878 309.936 84.291 309.936 c 84.703 309.936 85.113 310.106 85.404 310.397 c 85.696 310.689 85.866 311.099 85.866 311.511 c f 0.373 0.169 0.255 rg BT 91.016 308.695 Td /F4 9.0 Tf [(Cyber safety on social media)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 307.544 m 206.558 307.544 l S 0.153 0.153 0.153 rg 0.153 0.153 0.153 RG 85.866 300.522 m 85.866 300.934 85.696 301.344 85.404 301.636 c 85.113 301.927 84.703 302.097 84.291 302.097 c 83.878 302.097 83.469 301.927 83.177 301.636 c 82.885 301.344 82.716 300.934 82.716 300.522 c 82.716 300.110 82.885 299.700 83.177 299.408 c 83.469 299.117 83.878 298.947 84.291 298.947 c 84.703 298.947 85.113 299.117 85.404 299.408 c 85.696 299.700 85.866 300.110 85.866 300.522 c f 0.373 0.169 0.255 rg BT 91.016 297.706 Td /F4 9.0 Tf [(Cyber security while travelling)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 296.555 m 210.041 296.555 l S 0.153 0.153 0.153 rg BT 61.016 277.717 Td /F4 9.0 Tf [(More tips and resources can be found )] TJ ET 0.373 0.169 0.255 rg BT 214.592 277.717 Td /F4 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 214.592 276.566 m 232.601 276.566 l S 0.153 0.153 0.153 rg BT 232.601 277.717 Td /F4 9.0 Tf [(.)] TJ ET BT 190.354 257.728 Td /F4 9.0 Tf [([SOURCE: )] TJ ET 0.373 0.169 0.255 rg BT 238.864 257.728 Td /F4 9.0 Tf [(Cybersecurity and Infrastructure Security Agency, United States Government)] TJ ET 0.18 w 0 J [ ] 0 d 238.864 256.577 m 545.485 256.577 l S 0.153 0.153 0.153 rg BT 545.485 257.728 Td /F4 9.0 Tf [(\))] TJ ET 0.400 0.400 0.400 rg BT 61.016 239.239 Td /F2 9.0 Tf [(Posted in:News,Phishing,Security,Tips,Training | | With 0 comments)] TJ ET q 225.000 0 0 126.000 325.984 365.321 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 501.6862 232.6007 510.8437 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 417.7522 208.5467 426.9097 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecurity_starts_with_you.pdf) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 406.7632 198.0527 415.9207 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/creating_passwords.pdf) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 395.7742 197.5577 404.9317 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/cybersecure_at_work.pdf) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 384.7852 218.5817 393.9427 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/identity_theft_and_internet_scams.pdf) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 373.7962 221.5517 382.9537 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/mfa.pdf) >> endobj 24 0 obj << /Type /Annot /Subtype /Link /A 25 0 R /Border [0 0 0] /H /I /Rect [ 145.0517 351.8182 190.0787 360.9757 ] >> endobj 25 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/05/what-is-mfa/) >> endobj 26 0 obj << /Type /Annot /Subtype /Link /A 27 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 340.8292 148.0307 349.9867 ] >> endobj 27 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/online_privacy.pdf) >> endobj 28 0 obj << /Type /Annot /Subtype /Link /A 29 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 329.8402 179.5667 338.9977 ] >> endobj 29 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/phishing.pdf) >> endobj 30 0 obj << /Type /Annot /Subtype /Link /A 31 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 318.8512 202.5617 328.0087 ] >> endobj 31 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/protecting_digital_home.pdf) >> endobj 32 0 obj << /Type /Annot /Subtype /Link /A 33 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 307.8622 206.5577 317.0197 ] >> endobj 33 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/social_media.pdf) >> endobj 34 0 obj << /Type /Annot /Subtype /Link /A 35 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 296.8732 210.0407 306.0307 ] >> endobj 35 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/travel.pdf) >> endobj 36 0 obj << /Type /Annot /Subtype /Link /A 37 0 R /Border [0 0 0] /H /I /Rect [ 214.5917 276.8842 232.6007 286.0417 ] >> endobj 37 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/infoteg/dokumente/cybersecurity/why.pdf) >> endobj 38 0 obj << /Type /Annot /Subtype /Link /A 39 0 R /Border [0 0 0] /H /I /Rect [ 238.8643 256.8952 545.4853 266.0527 ] >> endobj 39 0 obj << /Type /Action /S /URI /URI (https://www.cisa.gov/publication/cybersecurity-awareness-month-publications) >> endobj 40 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 168 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 10916>> stream JFIF,,ExifMM*i2 &0000 t2017:06:02 14:57:042017:06:02 14:57:04 }http://ns.adobe.com/xap/1.0/ 2017-06-02T14:57:042017-06-22T11:50:16 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N  1!AQ"aq2B$345DRS#6TbsUdr#Q!12"3R ?{+ol3xKJRqh +M_$[\ sHU9a/oe1E%Zed,<xA[rcr9.[ؖ(qwDy N }/xdmrXx'࠱9x@/B ZOYaE1j[q_p"2㌔EK ;]5ے/ , wX>pa؋%Kn1`p*vNB0B pf8Q[XV)3)hJm;7v(h^#L%dm]A(:5(B=0߹7U:TzJqR۫m*6rT$Q.LJM'u5GX*2Z&(2d{DRwX06:rqF.X܍4jTw#|ԫM/<x2\$ԕp /࠹  ;JNMAQ &KeDJa "mtGnlbB8J7=e6<JPN=loiWKls5)ʤWU(^Sv7NeMcV#}65Һj}R\3QKM4oSkQ)]C~ i|C~ii^כW9gLkCwsK1 rUZJ\`¹DގS/1%Iʍ]8' d馻%k&!QY{vlSjNR5'tӨўawKohFG3)}|)*ݵ0><#zgViMSSpJMCGPB8ԧ+56WT%?Ihxcv4usI*miQ{>nğV-r$+' tJķ垵FMF=Isr*j'Q{4,թpRVmljU%_=tF*?Aw/ 2PXf+#`;2#k|[`g-V*z:Y)Qٞ}h΅WJyy,dqS~ÚzΗ$f:k4Mll^$ﵱY=~r&ZZ=:n5u?)1Gj3vo O~%i?ittcGOJ4FxHj~?k(/wXz,xw$RZ_o\YmO>MTZ3rTՔDmԔQk9,pQI5ksr, v!;$s LH/rȹ_l# fx["cQPA ؂=o|6ҬNJNOk͖/ ؕ߫wmlS )h ݚg{Ay??>Ln26af7o?~X] o?,}-~P~uƟ/UcN?y,yV.UtiߧShk?'˔=­TWJV O 3L~4 ߺ?,~[Oqjվqax;ŵ~;^ Μ)FKO=ӓ;|>&O]NPK_?/?yuhu4/ꩨ^K'Ŏxɍ+-ĖrdVf&<:.qvv-՟NB1g6cT9;=!Ν pU Xӻ!o>`!l"dU8aaN>`y({)b^@9!~/"þHEj#wquhY:r~uR7=EH8uҋ[eFjNrr?hw.[qWٞO'B~enJFm/iv*tE9)7M^m4Vk;<ܲ+ 6ҳ}NWrn=,Ct9ISk؛UgWEfzҊZjGI] s;]{ؖ{aB䂯GX}c]%{J.>.[$[0!HT jTn;x o@΄z[XяTcGW>+;aRN5a\r@6ʌ\RHTu'=b݉E  @Xaa_UUN6dR_b_b,ֵriԹo'&Jhf,0as(0> startxref 26442 %%EOF Tips « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Tips

Cybersecurity Awareness Month: Common passwords

Wednesday, October 3rd, 2018

The past two years have been particularly devastating for data security worldwide, with a number of well-publicised hacks, data breaches and extortion attempts.

Annually SplashData publishes a list of the most common passwords. The list is created using data from more than five million passwords that were leaked by hackers in 2018 and with a quick glance at the list, one thing is clear – we do not learn from our mistakes.

People continue to use easy-to-guess passwords to protect their information. For example, “123456” and “password” retain their top two spots on the list—for the fifth consecutive year and variations of these two “worst passwords” make up six of the remaining passwords on the list.

SplashData estimates almost 10% of people have used at least one of the 25 worst passwords on this year’s list, and nearly 3% of people have used the worst password – 123456.

Here is the list of the top 10 passwords of 2018:

  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. 12345
  6. 123456789
  7. letmein
  8. 1234567
  9. football
  10. iloveyou

Another typical example is 1q2w3e4r5t.  Although it seems very cryptic, one look at a computer keyboard and it’s easy to guess.

Not so clever passsword

It is a sobering fact that most people still underestimate the importance of having a secure password, and still make mistake to use simple words or numbers as a password.

“Passwords are the only control you have to secure your data with most systems these days. If your password is easily guessed by someone, then the person essentially becomes you. Use the same password across services and devices, and they can take over your digital identity.” Shaun Murphy, CEO of SNDR.

In the next post of our Cyber Aware Month series, we look at how to create a strong password you can remember.

 

Before you resign or retire …

Tuesday, July 31st, 2018

You’ve packed up your office, said goodbye to your colleagues and you are ready for your new job. But what happens to your sun email address, your data or any electronic services you used while working at Stellenbosch University? We have a few tips and instructions. 

As soon as your active role as staff expires, all your electronic services also terminate. This process is necessary to maintain a healthy and secure network and to ensure that unused, dormant accounts are not used for nefarious purposes by cybercriminals.

In other words, from the date when your service at SU is terminated, you no longer have an active role at the university and you can no longer use university services. In this event, you will receive an email from helpinfo@sun.ac.za informing you that your username will expire.

To ensure that you are prepared in advance, we also suggest you do the following at least three months before you leave the university:

  1. Create a new email address for yourself (if you don’t have one already) There are various options, for example, Gmail or Yahoo.
  2. Activate your Out of Office function on you sun.ac.za Outlook mailbox and indicate in the message what your new email address is, in case someone needs to contact you. 
  3. If you use your @sun address for your banking, Facebook, DSTV or iCloud accounts or any other services or social media, change it to your new email address. We would also like to urge you to keep your work-related and private emails separate. Rather create a private email address for your personal correspondence.
  4. If you have any personal data on your electronic work devices or network storage (G: or H: drive), remove it and store it on your own external hard drive or online cloud storage, for example, Google Drive or OneDrive
  5. Make sure that your relevant work-related data is accessible for further usage by your colleagues and the university after you leave. However, do NOT give your password to colleagues when you leave the university as this poses a security risk.
  6. If you need any assistance, contact Information Technology and one of our technicians can assist you.

Students who are graduating or terminating their studies can find the necessary information on this pamphlet compiled by the IT HUB.

Clear the clutter

Thursday, April 26th, 2018

In June 2016 we were introduced to Office365, but do we really know how all the functions of this online mail service work?

One such a function is the “Clutter Folder”. 

We have had many students (and some staff) who have reported that “email was missing” or that they were not receiving mail sent to them by mailing lists. While we initially thought that this was caused by users deleting mail or a problem with the email servers, an investigation revealed that in many cases the Clutter folder was the culprit. 

As it was originally designed, the Clutter folder was supposed to help users filter low-priority email, saving time for more important messages. Supposedly, the email server would keep track of the email users read and the ones they didn’t and put them into the Clutter folder. For all new students, as well as staff, the mailbox feature “Clutter” is turned on. Once it is turned on, Clutter is automatic.

Because mail is left unread for a couple of days, Outlook 2016 starts sending a lot of mail to the Clutter Folder, leaving students to complain that mail is not being delivered and “important mail is missing”. All the “missing” mail is still there. It is just in the Clutter Folder.

The best solution is to disable the Clutter folder entirely, so unread mail is not sent there. Here is how to do it:

  1. Sign in to Outlook Web Access (http://www.sun.ac.za/webmail)
  2. In the top right-hand corner, click the small cog icon. A sidebar will appear.
  3. Near the bottom of the sidebar is a heading saying My App Settings.
  4. Click Mail underneath this and you will be taken to the Mail Options page.
  5. On the left menu, underneath the Automatic Processing menu item, click Clutter.
  6. Uncheck the box that says Separate items identified as clutter
  7. Click the Save button at the top of the page.

Once the Clutter filter has been disabled, you can then move all your “missing” mail in the Clutter Folder to your Inbox. 

 

[Information supplied by David Wiles]

 

Protect your personal information

Monday, January 29th, 2018

Data Privacy Day, occurring every year on 28 January, is an international effort to empower individuals and business to respect privacy, safeguard data and enable trust. 

Over the past year the world saw many extensive data breaches across the world. This has accentuated the necessity for creating a greater awareness of protecting information. 

But why should we care about our information?

We are entering the next generation of technological advancement like the Internet of Things, which will connect devices in our schools, home and workplaces. This provides many opportunities, but consumers will have to learn to protect and secure their information. Your devices make it easy to connect to the world around you, but they can also track a lot of information about you and your family. 

How much information do you share online daily? We spend most of our day on the internet where all our actions are tracked and collected by the devices we use. This data is stored indefinitely and can be used at any time. 

The National Cyber Security Alliance in the United States have the following tips:

  1. Personal info is like money: value it, protect it. 
    Be thoughtful about who gets your information and how it’s collected through apps and websites. Delete unused apps, update others and review your app permissions.
  2. Share with care.
    Think before posting about yourself and others online. Review your social network friends and contact lists regularly.
  3. Own your online presence.
    Set the privacy and security settings on websites and apps. You can share information with only friends and family.
  4. Lock down your login.
    Make sure your accounts are secure. Don’t use a password only for bank accounts, email and social media. Use two-step authentication, bio-metrics or security keys.
  5. Keep a clean machine.
    Keep your software, operating systems (mobile and PC), anti-virus and apps updated to prevent data loss, infections and malware.
  6. Apply the golden rule. 
    Post only about others as you would have them post about you.
  7. Secure your devices.
    Every device should be secured with a password or strong authentication – finger swipe, facial recognition, etc. Imagine what someone could do with the information on your device if it got lost?
  8. Think before you app.
    Information about you, such as the games you like to play, your contact lists, where you shop and your location has tremendous value. Apps collect this information. A recent example is activity-tracking app, Strava’s privacy issue. 

FACT AND STATISTICS

  • 41% of Americans have been personally subjected to harassing behaviour online and one in five (18%) has been subjected to particularly severe forms of harassment online. 
  • 82% of cyber-stalkers use social media to find out where their potential victims live, where they go to school, etc.
  • Four in five US physicians have had cyber-attacks in their practices. Keep in mind that medical and health information is among the most sensitive and personal information about people. 

 

[SOURCE: https://staysafeonline.org and www.wikipedia.org]

OneDrive: 5TB just for you

Monday, July 31st, 2017

Since June staff members have full access to the online Office365 applications. Besides Outlook email, SharePoint Online, access to the MS Office apps (for example Word, Excel, PowerPoint, etc.) and being able to download Office 2016, there is one significant advantage of using the Office365 suite – OneDrive.

OneDrive provides 5TB of cloud storage space for each staff member and student. This means you now have ample space to store your documents and your data will be available from anywhere, anytime, on any device with an internet connection.

What are the advantages of cloud services? 

  • More storage space available, up to 5TB on OneDrive and 50GB on Outlook.
  • Your data is available from anywhere, anytime, on any device. You’ll always have access to your data if you have an internet connection.
  • Your information is also safely stored, even if you lose one of your devices.  

What are the disadvantages of cloud services?  

  • Familiarise yourself with copyright regulations. Make sure you know what you are allowed to store and share online.  SU copyright agreements do not extend to storing of documents protected under the copyright law on OneDrive for business or any other public store space.
  • You are entirely responsible for your own information. Be careful who you give rights and access to, as it will compromise your information if it’s visible to other people.
  • You are responsible for synchronisation between online and local data. Synchronisation between online and local information needs to be set up correctly and done on a regular basis.
  • Keep in mind that access to cloud services when on campus will not incur any costs, but if you work from home your own data will be utilised.
  • It is very important that you keep your private usernames, passwords and information separate from your official work, to prevent your data from getting mixed up.
  • Having access to the cloud from any computer makes your digital identification vulnerable, do not use computers you do not trust to access your cloud services.

What if I have been using OneDrive personal, Dropbox and other cloud storage options? 

You can keep on using them, but it is very important that you only use these storage options for your personal data.

OneDrive for business and SharePoint online are available under the US MS Licence agreement for storage and sharing of institutional data. The storage and sharing of institutional data are not allowed on Dropbox, OneDrive personal or any other cloud storage. 

How do I get access to my OneDrive storage space?

All staff automatically has access to OneDrive. Log on to Office365 with your email address and password. OneDrive is also accessible via the portal by clicking on the Office365 link or searching for Office365 in the search field.

IMPORTANT:

  • When using cloud-based services, you have to keep your private and work usernames, passwords and data separate. Never use the same username for private and work email accounts, storage spaces and applications.
  • SU copyright agreements do not extend to storing and sharing of documents protected under the copyright law on OneDrive for business, SharePoint online or any other public store spaces.

 

 

If you have any questions, please let us know by logging a request on ServiceNow or calling our Service Desk at 808 4367. For more information on the Office365 package, please consult our FAQs or have a look at the Office365 training videos.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.