%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250714043251+00'00') /ModDate (D:20250714043251+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10151 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 53.096 521.469 693.638 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 53.471 520.719 692.888 re S 0.773 0.773 0.773 rg 61.016 68.846 m 550.984 68.846 l 550.984 69.596 l 61.016 69.596 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(FREE DIGITAL LITERACY TRAINING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 10,2019)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Our training service provider, StellieTech is currently offering a 3 Day Digital Literacy Course \(see below for more detail on )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(content, requirements, etc.\))] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(The course is free to all SU staff, but space is limited, so register as soon as possible if you're interested.)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(To register, go )] TJ ET 0.373 0.169 0.255 rg BT 121.541 586.453 Td /F4 9.0 Tf [(Sun e hr)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 121.541 585.302 m 155.561 585.302 l S 0.153 0.153 0.153 rg BT 155.561 586.453 Td /F4 9.0 Tf [(-> SUN Employee Self service-> Training and Development-> Learner Home-> Information )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Technology and the course will be listed there.)] TJ ET BT 61.016 555.475 Td /F4 9.0 Tf [()] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 545.777 m 306.516 545.777 l 305.766 545.027 l 305.766 545.027 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 543.527 m 306.516 543.527 l 305.766 544.277 l 305.766 544.277 l f 306.516 545.777 m 306.516 543.527 l 305.766 544.277 l 305.766 545.027 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 545.777 m 305.016 543.527 l 305.766 544.277 l 305.766 545.027 l f 0.153 0.153 0.153 rg BT 61.016 525.736 Td /F4 9.0 Tf [()] TJ ET BT 61.016 505.747 Td /F1 9.0 Tf [(Duration:)] TJ ET BT 103.514 505.747 Td /F4 9.0 Tf [(3 Days)] TJ ET BT 61.016 485.758 Td /F1 9.0 Tf [(Recommended Prerequisites: )] TJ ET BT 190.553 485.758 Td /F4 9.0 Tf [(Basic computer skills)] TJ ET BT 61.016 465.769 Td /F1 9.0 Tf [(Certificate of training:)] TJ ET BT 157.028 465.769 Td /F4 9.0 Tf [(StellieTech Certificate of Completion)] TJ ET BT 61.016 445.780 Td /F1 9.0 Tf [(Assessments: )] TJ ET BT 124.538 445.780 Td /F4 9.0 Tf [(Graded pre and post assessments between lessons.)] TJ ET BT 61.016 425.791 Td /F1 9.0 Tf [(Overview: )] TJ ET BT 106.538 425.791 Td /F4 9.0 Tf [(This course aims to equip the learner with the knowledge and appreciation of the business environment and to )] TJ ET BT 61.016 414.802 Td /F4 9.0 Tf [(empower them to be efficient and effective in the office.)] TJ ET BT 61.016 394.813 Td /F1 9.0 Tf [(Course Objectives:)] TJ ET BT 61.016 374.824 Td /F4 9.0 Tf [( Gain an insight into working with the internet and being able to use these skills in the workplace.)] TJ ET BT 61.016 354.835 Td /F4 9.0 Tf [( Learning how to be an effective assistant by using technology to enhance your productivity.)] TJ ET BT 61.016 334.846 Td /F4 9.0 Tf [( Computer training and basic tasks needed as a certified computer user.Course Information)] TJ ET BT 61.016 314.857 Td /F1 9.0 Tf [(Course Outline)] TJ ET BT 61.016 294.868 Td /F4 9.0 Tf [(Session 1: Working with the Internet)] TJ ET 0.153 0.153 0.153 RG 85.866 277.695 m 85.866 278.107 85.696 278.517 85.404 278.809 c 85.113 279.100 84.703 279.270 84.291 279.270 c 83.878 279.270 83.469 279.100 83.177 278.809 c 82.885 278.517 82.716 278.107 82.716 277.695 c 82.716 277.283 82.885 276.873 83.177 276.581 c 83.469 276.290 83.878 276.120 84.291 276.120 c 84.703 276.120 85.113 276.290 85.404 276.581 c 85.696 276.873 85.866 277.283 85.866 277.695 c f BT 91.016 274.879 Td /F4 9.0 Tf [(Internet)] TJ ET 85.866 266.706 m 85.866 267.118 85.696 267.528 85.404 267.820 c 85.113 268.111 84.703 268.281 84.291 268.281 c 83.878 268.281 83.469 268.111 83.177 267.820 c 82.885 267.528 82.716 267.118 82.716 266.706 c 82.716 266.294 82.885 265.884 83.177 265.592 c 83.469 265.301 83.878 265.131 84.291 265.131 c 84.703 265.131 85.113 265.301 85.404 265.592 c 85.696 265.884 85.866 266.294 85.866 266.706 c f BT 91.016 263.890 Td /F4 9.0 Tf [(Navigation and Media Literacy)] TJ ET 85.866 255.717 m 85.866 256.129 85.696 256.539 85.404 256.831 c 85.113 257.122 84.703 257.292 84.291 257.292 c 83.878 257.292 83.469 257.122 83.177 256.831 c 82.885 256.539 82.716 256.129 82.716 255.717 c 82.716 255.305 82.885 254.895 83.177 254.603 c 83.469 254.312 83.878 254.142 84.291 254.142 c 84.703 254.142 85.113 254.312 85.404 254.603 c 85.696 254.895 85.866 255.305 85.866 255.717 c f BT 91.016 252.901 Td /F4 9.0 Tf [(Browser Functionality)] TJ ET 85.866 244.728 m 85.866 245.140 85.696 245.550 85.404 245.842 c 85.113 246.133 84.703 246.303 84.291 246.303 c 83.878 246.303 83.469 246.133 83.177 245.842 c 82.885 245.550 82.716 245.140 82.716 244.728 c 82.716 244.316 82.885 243.906 83.177 243.614 c 83.469 243.323 83.878 243.153 84.291 243.153 c 84.703 243.153 85.113 243.323 85.404 243.614 c 85.696 243.906 85.866 244.316 85.866 244.728 c f BT 91.016 241.912 Td /F4 9.0 Tf [(Rights and Usage)] TJ ET 85.866 233.739 m 85.866 234.151 85.696 234.561 85.404 234.853 c 85.113 235.144 84.703 235.314 84.291 235.314 c 83.878 235.314 83.469 235.144 83.177 234.853 c 82.885 234.561 82.716 234.151 82.716 233.739 c 82.716 233.327 82.885 232.917 83.177 232.625 c 83.469 232.334 83.878 232.164 84.291 232.164 c 84.703 232.164 85.113 232.334 85.404 232.625 c 85.696 232.917 85.866 233.327 85.866 233.739 c f BT 91.016 230.923 Td /F4 9.0 Tf [(Email Clients)] TJ ET 85.866 222.750 m 85.866 223.162 85.696 223.572 85.404 223.864 c 85.113 224.155 84.703 224.325 84.291 224.325 c 83.878 224.325 83.469 224.155 83.177 223.864 c 82.885 223.572 82.716 223.162 82.716 222.750 c 82.716 222.338 82.885 221.928 83.177 221.636 c 83.469 221.345 83.878 221.175 84.291 221.175 c 84.703 221.175 85.113 221.345 85.404 221.636 c 85.696 221.928 85.866 222.338 85.866 222.750 c f BT 91.016 219.934 Td /F4 9.0 Tf [(Calendaring)] TJ ET 85.866 211.761 m 85.866 212.173 85.696 212.583 85.404 212.875 c 85.113 213.166 84.703 213.336 84.291 213.336 c 83.878 213.336 83.469 213.166 83.177 212.875 c 82.885 212.583 82.716 212.173 82.716 211.761 c 82.716 211.349 82.885 210.939 83.177 210.647 c 83.469 210.356 83.878 210.186 84.291 210.186 c 84.703 210.186 85.113 210.356 85.404 210.647 c 85.696 210.939 85.866 211.349 85.866 211.761 c f BT 91.016 208.945 Td /F4 9.0 Tf [(Communication Methods)] TJ ET 85.866 200.772 m 85.866 201.184 85.696 201.594 85.404 201.886 c 85.113 202.177 84.703 202.347 84.291 202.347 c 83.878 202.347 83.469 202.177 83.177 201.886 c 82.885 201.594 82.716 201.184 82.716 200.772 c 82.716 200.360 82.885 199.950 83.177 199.658 c 83.469 199.367 83.878 199.197 84.291 199.197 c 84.703 199.197 85.113 199.367 85.404 199.658 c 85.696 199.950 85.866 200.360 85.866 200.772 c f BT 91.016 197.956 Td /F4 9.0 Tf [(Digital Citizenship)] TJ ET BT 61.016 177.967 Td /F4 9.0 Tf [(Session 2: Fundamental basics)] TJ ET 85.866 160.794 m 85.866 161.206 85.696 161.616 85.404 161.908 c 85.113 162.199 84.703 162.369 84.291 162.369 c 83.878 162.369 83.469 162.199 83.177 161.908 c 82.885 161.616 82.716 161.206 82.716 160.794 c 82.716 160.382 82.885 159.972 83.177 159.680 c 83.469 159.389 83.878 159.219 84.291 159.219 c 84.703 159.219 85.113 159.389 85.404 159.680 c 85.696 159.972 85.866 160.382 85.866 160.794 c f BT 91.016 157.978 Td /F4 9.0 Tf [(Hardware)] TJ ET 85.866 149.805 m 85.866 150.217 85.696 150.627 85.404 150.919 c 85.113 151.210 84.703 151.380 84.291 151.380 c 83.878 151.380 83.469 151.210 83.177 150.919 c 82.885 150.627 82.716 150.217 82.716 149.805 c 82.716 149.393 82.885 148.983 83.177 148.691 c 83.469 148.400 83.878 148.230 84.291 148.230 c 84.703 148.230 85.113 148.400 85.404 148.691 c 85.696 148.983 85.866 149.393 85.866 149.805 c f BT 91.016 146.989 Td /F4 9.0 Tf [(Internet Basics)] TJ ET 85.866 138.816 m 85.866 139.228 85.696 139.638 85.404 139.930 c 85.113 140.221 84.703 140.391 84.291 140.391 c 83.878 140.391 83.469 140.221 83.177 139.930 c 82.885 139.638 82.716 139.228 82.716 138.816 c 82.716 138.404 82.885 137.994 83.177 137.702 c 83.469 137.411 83.878 137.241 84.291 137.241 c 84.703 137.241 85.113 137.411 85.404 137.702 c 85.696 137.994 85.866 138.404 85.866 138.816 c f BT 91.016 136.000 Td /F4 9.0 Tf [(Mobile Devices)] TJ ET 85.866 127.827 m 85.866 128.239 85.696 128.649 85.404 128.941 c 85.113 129.232 84.703 129.402 84.291 129.402 c 83.878 129.402 83.469 129.232 83.177 128.941 c 82.885 128.649 82.716 128.239 82.716 127.827 c 82.716 127.415 82.885 127.005 83.177 126.713 c 83.469 126.422 83.878 126.252 84.291 126.252 c 84.703 126.252 85.113 126.422 85.404 126.713 c 85.696 127.005 85.866 127.415 85.866 127.827 c f BT 91.016 125.011 Td /F4 9.0 Tf [(Software Architecture)] TJ ET 85.866 116.838 m 85.866 117.250 85.696 117.660 85.404 117.952 c 85.113 118.243 84.703 118.413 84.291 118.413 c 83.878 118.413 83.469 118.243 83.177 117.952 c 82.885 117.660 82.716 117.250 82.716 116.838 c 82.716 116.426 82.885 116.016 83.177 115.724 c 83.469 115.433 83.878 115.263 84.291 115.263 c 84.703 115.263 85.113 115.433 85.404 115.724 c 85.696 116.016 85.866 116.426 85.866 116.838 c f BT 91.016 114.022 Td /F4 9.0 Tf [(File and Software Management)] TJ ET 85.866 105.849 m 85.866 106.261 85.696 106.671 85.404 106.963 c 85.113 107.254 84.703 107.424 84.291 107.424 c 83.878 107.424 83.469 107.254 83.177 106.963 c 82.885 106.671 82.716 106.261 82.716 105.849 c 82.716 105.437 82.885 105.027 83.177 104.735 c 83.469 104.444 83.878 104.274 84.291 104.274 c 84.703 104.274 85.113 104.444 85.404 104.735 c 85.696 105.027 85.866 105.437 85.866 105.849 c f BT 91.016 103.033 Td /F4 9.0 Tf [(Troubleshooting Basics)] TJ ET 0.400 0.400 0.400 rg BT 61.016 83.044 Td /F2 9.0 Tf [(Posted in:Training | Tagged:Courses,Training | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 121.5407 585.6202 155.5607 594.7777 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://sun-e-hr.sun.ac.za/OA_HTML/AppsLocalLogin.jsp) >> endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000554 00000 n 0000010758 00000 n 0000010870 00000 n 0000010985 00000 n 0000011105 00000 n 0000011213 00000 n 0000011341 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 11446 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

Information Security Awareness Training

Tuesday, October 5th, 2021

Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.

So why would a university be targeted?

Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.

Consequences and why it matters:

Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.

A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.

In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.

To access the course, go to https://learn.sun.ac.za. When the SUNLearn main page opens, click on the “Information Security Awareness Training” link and log in with your network username and password. If you’re successfully logged in, scroll down and click on the “Enrol me” button to enrol yourself for the course and to access the training material.

If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via https://learnhelp.sun.ac.za for SUNLearn support.

 

 

 

 

 

Why is cyber security important?

Tuesday, October 5th, 2021

Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.

Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.

Did you know that:

  • As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2
  • 43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began

More tips and resources can be found here

The US government’s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format. 

More tips and resources can be found here

[SOURCE:  Cybersecurity and Infrastructure Security Agency, United States Government

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Microsoft Teams performance tips

Tuesday, July 6th, 2021

Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams meeting has minimum disruptions. The tips are split into three categories:

  1. Good practices
  2. Preparing for a trouble-free meeting
  3. Steps to take if you experience a poor connection

The good practices include:

  1. Regularly shut down and restart your PC – at least once a day. The shut down and restart cleans the PC of processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the morning.
  2. Regularly run updates, ensuring that the operating system and applications are up to date. This should happen almost automatically on University owned PCs.
  3. Regularly run virus checks.

Preparing for a trouble-free meeting – especially important if you are the host or presenter for a meeting:

  1. Close all unnecessary applications.
  2. Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at Speedtest by Ookla – The Global Broadband Speed Test.
    For voice only and sharing images you need less than one MB/second. For sharing applications and using your webcam, you need between 1 and 2 MB/s.
    For video you preferably need 2 MB/s.
  3. Test if your PC has sufficient resources.
    For Windows 10 press Ctrl + Shift + Esc.
    For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field. 
    Start typing “Activity Monitor.”
    The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.
  4. If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your meeting.
    To do this right click the Teams icon on the task bar and Quit, then start again.

5. If you share your Internet with other users (e.g. at home), ensure that the others know and do not hog the Internet connection. (e.g. do not play video, stream content, run updates).
Turn the camera off and use audio only if  the speed test or PC resources tests did show limitations.

6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus where you are unlikely to run into limitations. Use Ethernet (a cable connection to your router) rather than Wi-Fi if you have Ethernet available.

7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice switching devices so that you are familiar with how it works before you host a meeting.

Steps to take if you experience a poor connection:

  1. Turn the camera off if it was on.
  2. Turn off incoming video: (last item under the three dots menu).
    You will still be able to see shared screens and comments.

3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.