%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 15 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R /I2 17 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250720070508+00'00') /ModDate (D:20250720070508+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4494 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 91.769 521.469 654.965 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 91.769 l 565.984 91.769 l 565.984 745.984 l f 45.266 746.734 m 45.266 91.769 l 46.016 91.769 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(MICROSOFT TEAMS PERFORMANCE TIPS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(June 07,2021)] TJ ET BT 160.079 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 174.587 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(meeting has minimum disruptions. The tips are split into three categories:)] TJ ET BT 78.360 595.469 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 595.453 Td /F4 9.0 Tf [(Good practices)] TJ ET BT 78.360 584.480 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 584.464 Td /F4 9.0 Tf [(Preparing for a trouble-free meeting)] TJ ET BT 78.360 573.491 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 573.475 Td /F4 9.0 Tf [(Steps to take if you experience a poor connection)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(The good practices include:)] TJ ET BT 78.360 533.513 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 533.497 Td /F4 9.0 Tf [(Regularly shut down and restart your PC at least once a day. The shut down and restart cleans the PC of )] TJ ET BT 91.016 522.508 Td /F4 9.0 Tf [(processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the )] TJ ET BT 91.016 511.519 Td /F4 9.0 Tf [(morning.)] TJ ET BT 78.360 500.546 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 500.530 Td /F4 9.0 Tf [(Regularly run updates, ensuring that the operating system and applications are up to date. This should happen )] TJ ET BT 91.016 489.541 Td /F4 9.0 Tf [(almost automatically on University owned PCs.)] TJ ET BT 78.360 478.568 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 478.552 Td /F4 9.0 Tf [(Regularly run virus checks.)] TJ ET BT 61.016 458.563 Td /F1 9.0 Tf [(Preparing for a trouble-free meeting - especially important if you are the host or presenter for a meeting:)] TJ ET BT 78.360 438.590 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 438.574 Td /F4 9.0 Tf [(Close all unnecessary applications.)] TJ ET BT 78.360 427.601 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 427.585 Td /F4 9.0 Tf [(Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at )] TJ ET 0.373 0.169 0.255 rg BT 91.016 416.596 Td /F4 9.0 Tf [(Speedtest by Ookla - The Global Broadband Speed Test)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 415.445 m 316.637 415.445 l S 0.153 0.153 0.153 rg BT 316.637 416.596 Td /F4 9.0 Tf [(. )] TJ ET BT 91.016 405.607 Td /F4 9.0 Tf [(For voice only and sharing images you need less than one MB/second. For sharing applications and using your )] TJ ET BT 91.016 394.618 Td /F4 9.0 Tf [(webcam, you need between 1 and 2 MB/s. )] TJ ET BT 91.016 383.629 Td /F4 9.0 Tf [(For video you preferably need 2 MB/s.)] TJ ET BT 78.360 372.656 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 372.640 Td /F4 9.0 Tf [(Test if your PC has sufficient resources.)] TJ ET BT 91.016 361.651 Td /F4 9.0 Tf [(For Windows 10 press Ctrl + Shift + Esc. )] TJ ET BT 91.016 350.662 Td /F4 9.0 Tf [(For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field.)] TJ ET BT 91.016 339.673 Td /F4 9.0 Tf [(Start typing Activity Monitor. )] TJ ET BT 91.016 328.684 Td /F4 9.0 Tf [(The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.)] TJ ET BT 78.360 317.711 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 317.695 Td /F4 9.0 Tf [(If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your )] TJ ET BT 91.016 306.706 Td /F4 9.0 Tf [(meeting.)] TJ ET BT 91.016 295.717 Td /F4 9.0 Tf [(To do this right click the Teams icon on the task bar and Quit, then start again.)] TJ ET q 149.250 0 0 183.750 61.016 100.769 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 415.7632 316.6367 424.9207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.speedtest.net/) >> endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 199 /Height 245 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 18054>> stream Adobed  !1AQaq"2BR b#3r$%!1"QaAq2B ? .N.JwȿA_䅰A!thsw^:9E7^E@/4#8?7*g΁erSsG@MU {d@Iq;E Qn0 qR(6JY2 tCHql t$aZK=Y;h6@Xy r-F6Ky&\$ed=A7aWn|_AY.0G;#@D$|'D]KUN+\DA9 HjmkݰvLC&U:Lޔ8i eUՊ~~暦1!^D<~ /wNW% aY]K!#rz6m>5q+bU1-:r}-5Е9h^1 n@}"ot$4ph% =J?bR],pG {p4H<,Ӑ 7 PP\ q*؄=ʪ<4E k'@4]8al4 ^W%4 dUſ@͔^䪖R@'UHܩ΂NJ% [@pFP@.99T(xD@T}4?ȹE)A]WɄh2dy>bXCXKadfL7f)Dz'ҳ,20eSz,5PѺrg0ra%p:@,"nd%-DMDk[l;eZ}uK.}'!ڕب#%JzC ;t=4b̂U,jckÂma ,) lbr2|vMD<S-0,зsȸ, d3k8*.k;h~)p#m :BK߱ƂYP2;9L+ݒӒȹ[D4 otTą\Ƃ T'!>V#\e8Tdl&O2tMc :q{ (kbd$|[A ')͔Pp4 I ?5t,_h>!ۥc@ɲ*B SsJ,4 @WN~]t)^W'mʓsk5[} $.nP.qŀc?t (! z{o >Dn{[خhPV[8M{:EQ8 9h);4S"['%/>-I!_gI>W(V䕜- NN"ȩYcy$_QS`˗P3?'G?Dvw$O{c} Bj>GXd8 h#d)MVEШ#[$'-`l[rAMTN>/Ͼ#|[! AxWf'1uWiFW0mi?H8N4[w.RI$?o}1wua1ӗ>;|_>-hn5O~5?'75N;k?kGu7ZZ*z{t栟"fy[lQM~!A=,2e]':?5uc,8:DVϕsr_7+$׼ͭigPO'TORӓ8-AOM`' Թ2iԪ-|i/ᇮ[1U)[u6&*>3z򰀭G0*$htYSDAD>.Gm\LMrB&==./.m[lA͐hr6` dȷ˾*7>^ u t >`{4`E9FSn]A>PN䒷>1 @B"t*Ą}@,Eӌ?m[ x/T9FQO@/PBPo)`oh"-ud( >"q`t'Dd/?M0$q͈tExN|@mbF4HR-IM[X#F2sy.ȈYEB@x$/$8 .|_Ay%gJu\S} =$tq8I @cA'j"\: 3ao?<@%|s}t(# sYOCv4\SL@`6\z2OHk읖*Ha EMo?HzY#_ 2=a8'S9dDABBay˷Nľr=ZQ[!jN*m oZNIXSQtƘ6ʜfL=؉{Oh٣ 眒Zu;Ȝ=eDu'|9CK>x(nܼ -R!IUo5*%'[9IeB'3; 5EXE@*Z>[4E2T,1F4MLq=nbDIJ u ;&ד7Y:>U3Ѳ8׮r<@-zg@mF*x ."jɭ/\Ⱦ`t{}J:ØW6LfM[mGmmW'Rjo$}WZ ?nYNihIy3?] K4ulX-Ҟ{3Q;'ک^OӉlE󺂞N8eM.S7 e-9v?eLTb=}S<96;`h("ָ 8 ů`Đ :P D z2&J.>DD2ؓvMYkh.GO`W련l\q@$[>[~.W(ٺ9Lk m4.b\t4e9aIQ2}تvzSb4US(_ZӍڡfu=9cnc@HU03J_xk-o ؙq-Jم.t4Z #KX^zyA|`'\zJs$.pEpP ͔ hnE@*xEF=< o@@SI…9:*` ^_>nnNTتb% 2@""'e p!0Jde:B\Y P9p2.G#@vy]b5[p5sAxuD΀lHE[sƂ@(9S%0Ef7ݴ EH}  rmt)(="cA]pN`Vtp8AA{-D*A6@RM9#$~UU ͳ#_#Pwx&R4N@K4@UY $3 Ҍ2TXԛc;ܙ$Hds͎W'FN&ۗ*⤉ H-G wa]r:ose;6BȢe5e@ꐖTA<{Q-{MRMDGQK)@Vdo}C$Y+{Ȅh` m _tHAtON’2m MQ&eA~td^2p ln.@ =ALgVi[7N%nh;H07{]X%QO~boNT[=Q1`e[FVo)8e&{+2D3oaHbOVuq G^n%}joNL(9DtST^7:$T ټix9sGy!CMS2>vM92qP¹e7Yv/[meZ h:!ߏJ0ꂷ():ƛjzžٙdw$$LQk9 rg18U0̡Op3ظȐo:*gG;$U|l^}X\mlΛg-/ QJ1rY1:W$N&t=HșjV5|_2z}3i O-5:GZ^gqNZ~Zt-kzi6{o(ԞwOUҽڭm] O%(Y.gĉ,tDX$mmY1I9UԱ{*S \9:q"9,2㷑@BC=inYe,׎S nou>4sdBbvT%4 WE:qdK#JWPR­B {M@.?HKe:M]2H`PexK#r*.A#@ELw|E:eKO[v)/X~K 4;taCCH|b"׽‹~%JMǶ.,zx!{=Ag@_[r[SW-e t ؔ+ ! *t]Kf:U~t RdmY@. 4 rpOCd6 6Dk+4"eN=΀!@YIs2?#>Z HtC,i*&k)9JS4]K_DBƼ)[PnX|_!NoiT4F$QUH a6)t/xQLӳ)+H"!T\&.l ٹ$e@( C̄E1rH u8l/ |(HiP㓃` ] |%| mrrϹk@[AǍ@7(^p ]/͐h"m`}2n|]W@6%%{"A6rPZ+: J QpI#΀ !*},G&]|[؞|@O8\ X?B!KomT>/IN\bb.(!GNizuS+T楖ΥPc]RNv; AJkm; U10j"Rbi;pꚊe#CKyh_")5 @A4Ӥz~K?c[:gxMOV=Z sPmsG鏫gTtɇT(| H۪:pW1ugB0v1eS/bmoxh}*荚" %~ 轲q '&om:jV0r a(?Lw}[,BӬ䦄ۭ$5J%j(cGR|ci]B3e;tQKԕ/ơ%zmܖ}ёӔfN \c)&Ԝؘ:r_=ej:UQb%Q1̥-/'ayKa^2_bGCot7"n$ YE΁"=͇Hs 4 J@4Lߔd*S7!؄Jf_<}fRl:^CD{ -B*܇&Z'{OT=O)JZ̢Q:vJu0;/^ƚ t,4,鯁Z,i= m(n2,3a]L4]gj-2]-2!Pm$0.V@0ř` %$Bmd!6+pl S4 A %>7 ~ +P) <*K]R/(>ZL6AlXhGxumiU-0|x{&=^" NlHPT%-R(ة^ dàP(g@V`&Ƞ!sTh ,?W@X(v0tĀ=(:9 _ƂH@nI2>ZM ;4TB Q~-ਸ<[ArL"a}{ KLAJt y WƂlyY>k|sAP[w,WKx=@+(rU %ʹ(T{7Ӟ=S@TKB@N;tѲݷVC?imn*_@1!)ꡆB6Qy[ Fj@3Qsbk9dA{\aG7RSPT2 Y}O㞼mA^6h&ZcZմ/lT dPqQep^vD/潂\EϹ ־*H$V켕9ƂM&c$Vd"w hapyZN &t p&"*t S(_A<Jn;2YZ=ٙ, S֪=uQn\^Ҳf!Q4MK%0츗ǭ?v+޻ &QmVв]GI 1,֕5!\Ҳ9*I/j hЙ=iۈهpX dDC>{xwr|~ l4aAd,[ S|TDmh ˜nDS=˘n>GDi mWSNdy<-D[ÙaيyX曇2*nIU)At@nwݺAtJ,˷ L^[Q-:}7注yl$Lc4aҘhD9 Xu.en˷` =EƂ/H(PO(9:Ң*QO-hH d ] Sk$۸.\rnoʔ=h|PS=X &o`SA+7+d4 (6R !Wm{E6w ,<D(,nmbo| Bh E*AYvL Ŋ4@"cY r-WDKƁ\^'hpBKR(39.D@U-"8>r~ l-ox+@llx&~' ߷Ps'@`2T*_]Rn~'}tP h@Pݼ~UI;.4'nōmAP'ab#@y Z]%Es`@'E~qE(P ΁T*4f#I)k 9@ r0/b<$ %RhP8NB (PN! G *7b,a{܄QLpThPM{*1k{!Rq:\.{+L|\oP=7'!T(A!>Z>@!qtʹ RdB  &P[@)_976h 't'ܠ;pm:H)kXg" \Sp1AKح=}+'S)< 2i6D@:n*:6)Gp΃O^iMvR5kIk6s:qhuXSWN:kXdr-;=>}^S/7T}5g;8<|8(*_&\x[998iݯ~?Xĉ)U=5&~bNca٤O1((WøxfC MtܴZ$y/g0Ý= Ǜ&)9f^bߍ|)31?w%]%ݽ(e1$)[VrLJdT|6zkn Pr1l6kg!mvgxܙUa2:Y ORo~͗lVB_H_To) qMhsXS6"A V2ڥ;@02c{`:Jv:TV2MعDۭtę݆ۄt:F/ICHxEzd\]m59vO ʭoQTg'@S9KLMXo|򉃣>L_RU#TIܺ+Y(nO,)q}-/ @2Oe#;/3K 6mSۭU*.PEW!jf2a8%OLK#(rP-Fۺa1їɣ)0ЍKjyNvq7*c &d$D=I1Ƽ1qD~0Oг's(6JWfG qcS:*'jdFi:nG*(b҉8 0i1.]",nqT }t"@P>IEKe*G2 SkvV[Psƀ@5`[)9T8 bւ@RD B$n|H$]^l(ApTꎜCdO]Czftq,EĻh ]Ӟ'Ss.u+5UZMmR՝Gb&50qprN'1U:?j!ӈ,9tB@KݹC::a@N_}a۷+''m}ZR+5mQQQ1mrqQ/Zu ]Côh;cVAD/N7 y ܁@`!^@]zlp[RJP%`>Gr14'JV`\44ђr24XC|A=׋6$ZU=!IKfGk*kwn6ve>=VZq"SoH o8|LHKvPuv7NS.(:k`p=?HvB+aNL)AUJCO0Cka3MNjfE44q.Y<hb6L?9D|)#1S(YsqCZtgfMͧ+qI^I2TDGñN T/DSg%aܾmbǍt]*{DCBT?8jEQOjWNLQqpUFn\t񦥑Q#Èg!"0E4[TT5lSu=~-0w${/7 ^% Zu$z&M¼F\Iz XS]+,ncm4cMFrlѳJ}ԑ\4VM#%qsW0.XtQfP fpPId!+DzimV>[-mOa<,Zah><@ ,A9E[-Z)t{ \..P/ eD@=Fx!E' @͓(䌨+Bҹ(>V@!@@eA$=VR-{po΂A u. _R(T tߟc:0{J+϶?ᒥЏ8(mM5\Euƃi&})DG 78zb*9x!rw&ё{\RUD]QT}Y>Hg;ϥsɴ:>"6q.}Q-Kd_Al&s/xØDo^>WaOa DðL4 P؝aFn-{YĢٻsb7& 5<܊{v ,y `ꗂp,.qL=J6o"YmsvwJQT\)1-MyS^KtE1##ɔ(knvӧ2[\>ajHʾW0Q0k=+'m0۪E$$3Zb+nd90j>?j|߷ټVU3(ձ [tuASMm'/NkjFs2/E°oޙprzu]T VLJfaYn6[XIu]M>v?-Ν2a$6=zCQ;aܱa۶a,IV ==+" d",ST!y;" ŭHSh:I̓Gmb@TʹgdËR{Ys;{e?+s $%{M6 d 5^ r}UH7773\e@!߂j3E(GSwTJ;x \srt@eض5 ktQ\HO@eK u!"/ؑEBmC@+'濙<tPl%t[{h%PXZonA% kd{'7]:AXy':)A9ReBxз7(АUl]nC4P=AB:Bdc{[؄a( ,O${]`cL'~l,_7B+fE6'EMvuKW]a)̀MmngD>q{1.D5u;28ѻF`"'of_8b6툨s (' ؘjVp3b27x()$;>M"B!_HY KNZ~-6nXBLD<P6ZzJ]RUsqrh  h>m}E̻S\[/XzKnM8X$R&Q\c )^~'fi صi] u2:J<G=YO[9fK3ij> :fq2LKD}f Y.h7&U='QB:R&1 7PMDurJ<|߲%@[rDBm32)Uc1_LS$U}8%I[K DՇn6l:GYnM 12 3Vl:M>nM'lź} F?} ~tul|QPq .y  %/;|᧐ܽe2L4AYh܊7+qk|6nGBfAe67t(T#?_R`)nR]7!tU8 |m7''Q[!<3r!Rxkq{|6lzM=M4Cb xM&vRI%%만D8LZ#'ṭet۷NᇏʙH⛅ <m5#ޣ~=TGQT/jL򣔚Hv;WL󷛃۩4Axa"][-2MHnu;p76pNʾyRxIJ>5r3톜I$8u ;(!xx;w}U(HB!qlL5|dL/vLCa Xp~E8"ġ@E$h$T!sň?eo}*!Y~t_̕7c)p`Qoy&nRW)];U!*h J{>h H[' Io w0ꋜwn3[Th7Jte<{ 2nE'1"}8xos\2FPWAI1l= endstream endobj 15 0 obj << /Type /Page /Parent 3 0 R /Contents 16 0 R >> endobj 16 0 obj << /Length 2440 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 280.888 521.469 477.096 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 280.888 m 566.734 280.888 l 565.984 281.638 l 46.016 281.638 l f 566.734 757.984 m 566.734 280.888 l 565.984 281.638 l 565.984 757.984 l f 45.266 757.984 m 45.266 280.888 l 46.016 281.638 l 46.016 757.984 l f 61.016 296.638 m 550.984 296.638 l 550.984 297.388 l 61.016 297.388 l f 0.153 0.153 0.153 rg BT 61.016 740.193 Td /F4 9.0 Tf [(5. If you share your Internet with other users \(e.g. at home\), ensure that the others know and do not hog the Internet )] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(connection. \(e.g. do not play video, stream content, run updates\).)] TJ ET BT 61.016 718.215 Td /F4 9.0 Tf [(Turn the camera off and use audio only if the speed test or PC resources tests did show limitations.)] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(where you are unlikely to run into limitations. Use Ethernet \(a cable connection to your router\) rather than Wi-Fi if you have )] TJ ET BT 61.016 676.248 Td /F4 9.0 Tf [(Ethernet available.)] TJ ET BT 61.016 656.259 Td /F4 9.0 Tf [(7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice )] TJ ET BT 61.016 645.270 Td /F4 9.0 Tf [(switching devices so that you are familiar with how it works before you host a meeting.)] TJ ET BT 61.016 625.281 Td /F1 9.0 Tf [(Steps to take if you experience a poor connection:)] TJ ET BT 78.360 605.308 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 605.292 Td /F4 9.0 Tf [(Turn the camera off if it was on.)] TJ ET BT 78.360 594.319 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 594.303 Td /F4 9.0 Tf [(Turn off incoming video: \(last item under the three dots menu\).)] TJ ET BT 91.016 583.314 Td /F4 9.0 Tf [(You will still be able to see shared screens and comments.)] TJ ET q 129.000 0 0 225.000 61.016 347.116 cm /I2 Do Q BT 61.016 329.325 Td /F4 9.0 Tf [(3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 310.836 Td /F2 9.0 Tf [(Posted in:Communication,News,Tips,Training | | With 0 comments)] TJ ET endstream endobj 17 0 obj << /Type /XObject /Subtype /Image /Width 172 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 5993>> stream JFIFC    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,A!12AQqSa"BRTs#35$bdr/!RSaQ12"4qr ?_+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?tLaa|6 oSAUG^٭v/5"慲N sV#A +q0(**gm7AH\H%̈́b4:Y*HACn:6At66 y hN\O nj>0bsAp#RCAa-1Ҙ!PW-p b"5-El킖 g1;Y  S YصM,Un~b[셁TWxӖ5aËEqJ+ #|p1͍\Xf-P3l7>S("b5l*HhZoѓhh@A?d{M>j1)`Jw׺ ssAUTSF衒B? öow:q fg - eߴ>kejP3 hus|o;~~~gUgΨ#:x3Ψ#:x3 44V=^7c9X]n=kq>OhSk4(1lF6- Xn T uf])RXwL|iP>](Z-?뿖euO2:AQ6xKA`qm=M~8br5*Xf5-K)a|I&RHXVLRKRȡnc,ִo"=i p͐0Y ; RL2,DNas.z}Īil5C$AMPˇTy85n4">k@P.zM|gYh,pds8-ptd\~Md$-6sÿ(=Jχ,=؃U6: qsXIԒY _*/_Ոÿ WbU|⪺vHME *A s[@O@N&RN GL/xNam 'Xmo5"[l9]s-= @@@@@@@@A"ݐzL#>r|,wn(8 ZؕMa1<ۃm,èZsqjuU3PGFvmk|AA)o`.}ݐyr$Qq {IkID5Ťn ؄:i^,^P4A!#=\PhoPa.7vAjبC\yZna&k^#IIS[쑄͙\ }Z)RSX+l ٚ#lli (`^o٦bX%11f /F6A=< @G潷t+j~ZIIC43"q$w}R @@@@@@@@A"ݐ^3((ڴt: MVWAN4BG{\0mA} sh'~v1౥m6c-Emqq{ sch..`IQg1`8PN56$=ѽiA A(˅4A 6a\mmG1zbUtՎg2ļoz j :S}AvUfX o ?iq8ev_6kr: I`2: QQ%TO3I![yAcܠ \ntJ2i㨖ϙlQn@믶O l*,ѯ˥0 *f103Fc뛑˒ > G8/ 68_K{ČF3Sw\:| v |kc " A(&[ub5fbbbbbboPa.7vAwAM_l8(Pê<䴍htf:W2wN\B=WM$C3_h+HwdG312Ge#ˋr71mPZ\Ѽ@Tr$QqKE笧|ulC~]jmƫ1s쑍6#3r\MDp)!vakuid;A CۂC@XCl~k4K ?hFXn] r A(^BBBBBBBBBBB A(kjYl6N#H&/avA4pAq&ɲ107}۽kHctcs;RԏVTucܠ \n L$\I$rNAE` @@@dacܠ \nIMP:ZgJK-A,f1qQM |Qr'oAhgfY=-fm7)$^j:x^*=ο>V%M,2C9 8ZZWgMaÙ$7yc7 {>3z@Ѿ L{ }Kd8X|q"s^6 Sb%ϩN` @I НU |,(3kCA[Oq~H*V? E/ J_3 E;r |اxl|tf73i[4@3Tó@q)!sEH7pEbS2 :60!8S:)\Ƿ-Ü76:{asL"-l4;&0qD/A[#Nj9: @@@@@@@@A"ݐ[tqxP泘cdeA5^+;t;v~3cg-`Fm01l@1eq.pͼr_c+gk\\H"s@n/6gDs#qA"m1fcCA{dk6w $GI#\+Hwd~˙O1o^.\WNKvó0h@9MJ㝖-%s(!Rj#a5kݴ{6L{O2?r&KI6#6Srnn@qAK'c 9YŠ{ r$QqNH%((((((((((+_HwdT"F)_{}]DF3c h:vA:M3gH pfb73('pM5 uS5qn>f?+JÙJp>[ܨ[Fe76ټ*0o%$ikWL駪kp,9t yOZgOZxl?/c"43^dSF=f}KdžYC2)#K] >%|Hes;1o<FE>$ika/>_/M꣥ Y$ s4"쥕évH }GGQbuA#<ؚr=$Lo6i6v>J8i5wc{ )6z:JR樑  \?El6)#u+vX뗐6r8ILi6 Ӧ{_6a85PUOE)f or7OtjpݘsbtXc497kw ^d!"م6AcܠU,x%(]BS|tƱrWf?O=_~M:~M:~M:~M:~M:/ix</ix<'ix</ix<'ixB9Ķ7zڧ3l}9R endstream endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000350 00000 n 0000000387 00000 n 0000000525 00000 n 0000000607 00000 n 0000005153 00000 n 0000005265 00000 n 0000005380 00000 n 0000005500 00000 n 0000005608 00000 n 0000005735 00000 n 0000005813 00000 n 0000024036 00000 n 0000024101 00000 n 0000026594 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 32755 %%EOF Tips « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Tips

Defeat ransomware: Backup your data

Wednesday, July 5th, 2017

The destructive Petya ransomworm caused destruction and major interruptions of services around the world last week. Unfortunately, it’s becoming progressively more difficult to avoid these attacks as cybercriminals become more clever and inventive in their methods. While there are ways to prevent that you fall prey to such an attack, there’s one thing you can do which will ensure that you are safe. And it’s not technical or difficult to do.

Once a week, backup all your data. Yes, this is a menial, boring administrative task – and we all hate those, but by ensuring that your data is safe and sound elsewhere, it won’t matter if your PC is infected by ransomware or any other malware. If you do lose your data, you will have another version available. 

Here are a few quick tips to help you:

  1. Choose one day a week which suits you and make an appointment in your diary to do a weekly backup.
  2. Try not to overwrite your previous backup. Rather make consecutive copies in various folders on your external hard drive or on your network space and name each with the particular day’s date. If any of the documents become corrupt for some reason, you can always fall back on a previous version.
  3. Regularly check that the medium on which you made your backup is still in working order and you’re able to access your documents.
  4. Use more than one backup medium, for example, your network space AND an external hard drive.

Where should you backup data?

  1. Each staff member has access to his/her own network space (usually the h-drive) where you can save an allocated amount of data for free. You have 1GB at your disposal to backup your most critical documents. At an extra cost of R10-00 per 1GB this space can also be increased. This network space is also available via the web at storage.sun.ac.za if you find yourself away from the SU network. 
  2. On your departmental network space (usually the g-drive). The departmental drive can be used for files used by more than one person and 15GB is allocated to each department. SharePoint can also be used by groups for sharing documents.
  3. OneDrive allows each staff member 5TB of storage space. This is available via the Office365 suite. https://portal.office.com/
  4. If you choose to have your data close at hand, get yourself an external hard drive. Never save important data on a flash drive – its sole function is for transporting data from one device to another and is not a dependable medium for backup. Just ensure that these devices are stored somewhere else (not also in your office) or in a safe. If confidential, SU documents are kept on an external hard drive, files have to be protected with a password or encrypted. Keep in mind that if you lose the password, not even IT can salvage your data.
  5. Alternatively, you can save data in the cloud. We’ve already mentioned OneDrive, but GoogleDrive or Dropbox are also examples of this. It is extremely important that cloud storage is only for personal use, not for any academic information or sensitive data. Also keep in mind that if you use more than one device, you have to sync data across devices and this will incur costs.

More tips on backups, as well as activating Windows’ automatic backup function on www.backblaze.com.

 

 

Alternative facts, fake news or lies?

Wednesday, March 1st, 2017

If there’s one thing the US election taught us, it’s that “alternative facts” exist and any news which puts Trump in a negative light is, apparently, “fake news”. Fake news does exist, but it’s not what Trump wants it to be.

“Fake news, or hoax news, refers to false information or propaganda published under the guise of being authentic news. Fake news websites and channels push their fake news content in an attempt to mislead consumers of the content and spread misinformation via social networks.” (http://www.webopedia.com/TERM/F/fake-news.html)

During the US election, it became clear that most of the fake news generated, including sites that improved Donald Trump’s chances as a candidate, originated from outside the United States. In Macedonia, one teenager started a lucrative business spreading the pro-Trump fake news. Whether this played any role in Trump’s presidential win, we’ll never know. Speaking of Trump – Did you hear he signed a visa-free travel policy for South Africa? Not true! Fake news! Sad! Even in South Africa, it was suggested that the ANC used fake news to try and influence the local elections. 

It’s easy to get swept up when you read something upsetting or ludicrous and of course, your first instinct is “I have to tell someone!” So you share it on Twitter, you send it via e-mail and you post it on Facebook and you feel like you are involved in spreading the news. And so something that’s not true spreads like wildfire and fake news peddlers are laughing all the way to the bank.

The increase of fake news means that we have to be more careful and even suspicious of what we read on the internet. If it looks like a news website, it doesn’t mean it is. On the contrary, it’s remarkably easy to create fake websites. There are ways to spot fake news, but it will require you to be more vigilant and above all, read more critically. Local (real) news website EWN lists a few tips to help you to distinguish between the real and the ridiculous. Mybroadband goes into even more detail with their article “How to stop falling for fake news on Facebook.”

Fake news characteristics are easily recognisable if you take the time to read the article before sharing it. By reading, you will notice details which don’t fit. If a headline sounds sensationalistic, it’s probably a fake article attempting to lure you into clicking.  Remember Google is your friend and can indicate whether the same news is shared by legitimate news sources or if this is the only one. It will also show if the article is an old one recycled to generate new clicks.

Avoid getting trapped in an echo chamber. We prefer to only read information and opinions we agree with and inevitably search engines only suggest similar articles with similar views. Try to read a bit wider – even articles covering topics that don’t necessarily interest you or you don’t agree with. Challenge your own viewpoints. 

 

More articles on fake news: 

We can’t talk about ‘fake news’ if we can’t agree what it means
Google and Facebook partner for anti-fake news drive during French election
Fake news website (Wikipedia)
List of fake news websites
List of satirical websites

 

[SOURCES: http://ewn.co.za; https://mybroadband.co.za/]

Security tips for travelling at home and abroad

Wednesday, March 1st, 2017

Travelling without your electronic devices is highly unlikely — whether it’s to the coffee shop around the corner or overseas. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

  • If possible, do not take your work or personal devices with you on international trips. If you do, remove or encrypt any confidential data.
  • For international travel, consider using temporary devices, such as an inexpensive laptop and a prepaid cell phone purchased specifically for travel. (For business travel, your employer may have specific policies about device use and travelling abroad.)
  • Install a device finder or manager on your mobile device in case it is lost or stolen. Make sure it has remote wipe capabilities and that you know how to do a remote wipe.
  • Ensure that any device with an operating system and software is fully patched and up-to-date with security software.
  • Makes copies of your travel documents and any credit cards you’re taking with you. Leave the copies with a trusted friend, in case the items are lost or stolen.
  • Keep prying eyes out! Use strong passwords, passcodes, or smart-phone touch ID to lock and protect your devices.
  • Avoid posting social media announcements about your travel plans; such announcements make you an easy target for thieves. Wait until you’re home to post your photos or share details about your trip.

While you’re there:

  • Physically protect yourself, your devices, and any identification documents (especially your passport).
  • Don’t use an ATM unless you have no other option; instead, work with a teller inside the bank. If you must use an ATM, only do so during daylight hours and ask a friend to watch your back. Also, check the ATM for any skimming devices, and use your hand to cover the number pad as you enter your PIN.
  • It’s hard to resist sharing photos or telling friends and family about your adventures, but it’s best to wait to post about your trip on social media until you return home.
  • Never use the computers available in public areas, hotel business centres, or cyber cafés since they may be loaded with keyloggers and malware. If you use a device belonging to other travellers, colleagues, or friends, do not log in to e-mail or any sensitive accounts.
  • Be careful when using public wireless networks or Wi-Fi hotspots; they’re not secure, so anyone could potentially see what you’re doing on your computer or mobile device while you’re connected.
  • Disable Wi-Fi and Bluetooth when not in use. Some stores and other locations search for devices with Wi-Fi or Bluetooth enabled to track your movements when you’re within range.
  • Keep your devices with you at all times during your travels. Do not assume they will be safe in your hotel room or in a hotel safe.

When you return:

  • Change any and all passwords you may have used abroad.
  • Run full antivirus scans on your devices.
  • If you used a credit card while travelling, check your monthly statements for any discrepancies for at least one year after you return.
  • If you downloaded any apps specifically for your trip and no longer need them, be sure to delete those apps and the associated data.
  • Post all of your photos on social media and enjoy reliving the experience!

Also read the New York Times article, “Traveling Light in a Time of Digital Thievery”. Looking for hotel safety tips? Watch this four-minute Travel Channel video, which explains how to avoid thefts, Wi-Fi hackers, and fire-hazard hotels.

 

[SOURCE: www.educause.edu]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.