%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250702060533+00'00') /ModDate (D:20250702060533+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 195.458 521.469 551.276 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 195.833 520.719 550.526 re S 0.773 0.773 0.773 rg 61.016 211.208 m 550.984 211.208 l 550.984 211.958 l 61.016 211.958 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(INFORMATION SECURITY AWARENESS TRAINING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Part of living in a connected world is understanding that our )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(private information is more vulnerable. ID theft and data breaches )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(are no longer isolated incidents, they happen every single day.)] TJ ET BT 61.016 595.453 Td /F1 9.0 Tf [(So why would a university be targeted?)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Universities hold a great deal of information that could be )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(exploited if it gets into the wrong hands. This information includes )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(personal details and research data.)] TJ ET BT 61.016 533.497 Td /F1 9.0 Tf [(Consequences and why it matters:)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(Though not all data security incidents will lead to the loss or theft )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(of information, they will expose information to unwanted risk.)] TJ ET BT 61.016 480.730 Td /F4 9.0 Tf [(A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious )] TJ ET BT 61.016 469.741 Td /F4 9.0 Tf [(incident. Any data security incident could potentially be disastrous for both you and the institution.)] TJ ET BT 61.016 449.752 Td /F4 9.0 Tf [(In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information )] TJ ET BT 61.016 438.763 Td /F4 9.0 Tf [(Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by )] TJ ET BT 61.016 427.774 Td /F4 9.0 Tf [(no means a programme that you will need to have a pass record. This course is strictly informational so that you will have )] TJ ET BT 61.016 416.785 Td /F4 9.0 Tf [(the necessary tools when it comes to Information Security.)] TJ ET BT 61.016 396.796 Td /F4 9.0 Tf [(To access the course, go to)] TJ ET 0.373 0.169 0.255 rg BT 174.074 396.796 Td /F4 9.0 Tf [(https://learn.sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 174.074 395.645 m 262.121 395.645 l S 0.153 0.153 0.153 rg BT 262.121 396.796 Td /F4 9.0 Tf [(. When the SUNLearn main page opens, click on the "Information )] TJ ET BT 61.016 385.807 Td /F4 9.0 Tf [(Security Awareness Training" link and log in with your network username and password. If you're successfully logged in, )] TJ ET BT 61.016 374.818 Td /F4 9.0 Tf [(scroll down and click on the "Enrol me" button to enrol yourself for the course and to access the training material.)] TJ ET BT 61.016 354.829 Td /F4 9.0 Tf [(If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and )] TJ ET BT 61.016 343.840 Td /F4 9.0 Tf [(active, please log a request via)] TJ ET 0.373 0.169 0.255 rg BT 187.079 343.840 Td /F4 9.0 Tf [(https://learnhelp.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 187.079 342.689 m 292.136 342.689 l S 0.153 0.153 0.153 rg BT 292.136 343.840 Td /F4 9.0 Tf [(for SUNLearn support.)] TJ ET BT 61.016 323.851 Td /F4 9.0 Tf [()] TJ ET BT 61.016 303.862 Td /F4 9.0 Tf [()] TJ ET BT 61.016 283.873 Td /F4 9.0 Tf [()] TJ ET BT 61.016 263.884 Td /F4 9.0 Tf [()] TJ ET BT 61.016 243.895 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 225.406 Td /F2 9.0 Tf [(Posted in:News,Notices,Security,Training | | With 0 comments)] TJ ET q 225.000 0 0 150.000 325.984 496.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 174.0737 395.9632 262.1207 405.1207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://learn.sun.ac.za/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 187.0787 343.0072 292.1357 352.1647 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://learnhelp.sun.ac.za/) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 200 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 17392>> stream JFIF``BExifMM*J PiZ >SONYSLT-A99V '  (00004 0 2015:04:09 14:56:522015:04:09 14:56:52250mm F1.4 }http://ns.adobe.com/xap/1.0/ 2015-04-09T14:56:522015-04-10T13:14:47 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N !1AQa"2q#BCR$Sbr%34DETsU&6c,!1AQ#"aq2 ?ʣ#橴) E 8H~Cph3sFUk&Ap efui'IO <غ9(5xK,X홢H8wfz6(J%oG7g%OJ#s{W [pK쾔 _".i>u뵱EID@@0ް.=_8HP*?SR-T^eTnpN9+m CC͑И K`xVlkc͏ k^ީ5_LRmL:wf+cG''^SūsOʓ'Z+N<&| 槩) #U Yu#-f҆O7*-q2$.1b U+ep\y!u7Hahqj+GfJ{BѵHt˷-[w$m#SNڊ3ЌɰU׮wk>`~<>״)H~\D|^E4eѧ5(=vm=ZO$ULn)❧) iKA[女ݢ%B^4dQnoU0_ (U쥠hՔtCƘAJ!ùFXridv)E/Ih= N 훸?SN\Ɔ BzIW|l\ unTݟ!(זZ{y릤]҇FCT+_Ltڅ=,ɇMHRƜ׈ZKjZOna{0*[Q3ALL BM tn(t)yD&DkJM!yv)GN"jn@xǿ"eoW>e1~*N/lY?ho?m H0۩7;D]wS'&)0oHAo1R˿eh'j-f*ʻxK=lշ6ɡ:M@ta^ZG勯D5QͶRtaV)ȭ3ҟt$ zCL*];gNЈ)$okB :Zú6T˰3y~Vgn[jX̵XuX|Ni#ZeE]qں|w&{5on w+\1v*|Zeb] plnГQ/+EDZ2{P3|)zOc W;F%A^2i-tEEqfjY[i&Nл[8@L;fJTxoSWrQ|R˃q[XՕJy6dAɞc_7s> yh--hkĢA&վ e7- R4 C6vED=|c*Bnwh6-Z6#xyÊ繥Ҕ=M.ii'tR ZqM0sTrƑ[mnBu93(I(oCɤV]mMI@XMnK!ぜ>wN(UaP vfَ骨:aΓP8aXXrXCm:y2&baxtawG[YM⚇F)N]K*;'ٲG? +)ۭ)ƞfVMܺesᒷz, (SgbN*X~Z2ء>{aqY7<i3FnI2xR &0d$II0:-%Yxͷ5@=(>*4jGYݫ`10r WݗP#OT42/bC#wyZo,:0W_e[eCh.Ϋ&%cl >^Omi+ߩ~H᙮*KG2 qW( SF^6x^\hJ+ ۬[κ(ۜ3Q8(2D^d*JlX ‰5#,+E(t7;ڎJ0U$=,rVhwX\B=> E: I`G"жŃPA[ nR|cTo0uc)y]LZdm1UI~M')a}`ܦPlOL;zG3J'oR}qMlG6a;+*\|V1TRB@ w{ts╹{Bi"1UcR kpo{Lgnٿ_sOe4ysnrIZ +e*Ta0:,Jhw=:iz.+ϗtKQWJ vF*JFntiPmH惣&mum%c ߍNʥmR\gPCY#FIeu?[_.vc@St{8#/ߑNa,9>6@SWJ0 ~5VAI!/hij.r [V䳶CRΪ4t*Tu1DkZr7-)ʔKA-ƻpc ȫMm9cO>N[hat3 JutѶ?!{"Kρ6nkCw@al &WGlW<Uko//һkyIq]ظe\wnv~lIz~ ?}꥟LZd H8\^>,O DaTćeE1ݔ] Nn#L)6[P?eo17i5eRA ;8 S_5Uhm24ӄζX%dLM.왢TRi٧'3Pu ssz=9mwQ<{!Se|8Fkv[kxYjX%EG%D g2g o% r촻S -`n^X)ќHܽZ[CK+᜜JhT׎)䠈Qm5pH!MMƀxȘH0 jeuϡv㾻hj V*0 wwv`9/c2;u_' &тxZ)}K[ⷀ/Di|C,kTXk`; mUt8ppM\jM\7B\%d\R(Ğ 𶊺u 끌+}Xoٽ\SIh*$N0պFђye Y. Z$kOjdӵ0 ܨvV7kbWGa$2t!/x@0y"C/qCWM2XrJ80O0/[qIa+n}kZ֗h*j?D aP[csF:nM?RZqhhHM1=(fVD'kgn!}4! l( ,ci*?Q/U_k*(5PN?A섯Ɔ3hF򅦆J7׼e7ߑ9qՕh"d/]KLx<?HUk <Σ2Ѻh\0< Wr$ te ƈ;fؚ;0AܻOX`2a81ハI6k-j߄dL598c^WK;ѣMtp h+ga[ pGհ4k{J}MN%vg'՛;?F(ѿ~)hv sO0#uIэ%n0,Xny.zog(-r֣*Sp&CSvcՌ.wkz\I9% 1JCK |g[3[ޕuG) nWDR^g 1y֨Vkwzj _Z5'ԷjX#:xm kG Y.>[А7^խ+<,2Ǵ3Nc=[waNCZio~J_7> QG4 $(+9 3EPAdm+L9[Si%̐cyom#qOKp4ÙSnkˈEC.׊8 \ZMB3y㙿7O`.hʝ$ -7S_ kqڜnGwO n,kq#3nۿoa$3K98,DutuS޳V#ވG%K ϳ[ o8(L޾dBc7vt}oNԘP1ҟ~+˅.tW ?ZS4w۹fU 2>KMH}gJ>tT*i(m-.S6tpAL~K-pu搯k~ Ck>v76^e5E8ɛ!%r48]O*߂6.뭒%p3FLo兘e2Qx,U#~Gw24 sa ${u3L܁)X? oQ,[;fPٶ,S<#tݽHMlE]!Ckj7{ža*WQJb؝lҥ$`c `ќ~e}3ƑU>+:XnQ*.j e}‡B0*OJ6SŕCPBԏ5;zJn\ghC'c9j:L٩trO61\S<"Qjn .=GdKd?EG5S";]s J6]rNأ nNHkQJp3&/KT 3V؍YMIۛ:odRy7tL8P{AFZI|X;~?4QxM+h6žrҾ 9QڳmU[2GZ2Zqy)n~tK LdfQ4Q! [ĬkժS`4;6m:آL K׊Gى$wzӢ[E=;[+w nU59Mlékwqκ"hYQU-^qt u4(sxy3nJmDovrO*M-#fcnԦ-ߖC(mr&8M.4ժg;0w)`_w[P>U{3FԳӢ^qZgz]]qS7 Mun[~!ve8 `[[e2I##w=TI㭤x#GgTsc29)#2 +.n5UV=3tb<04o rלIe+δ}WYE1(xXʑSmрVJۭuq~ॶS5c+c '*Ƒ,w:XA{4 +BXD1c)%`[k$ ΰjӪ 6ݨ$2[jᇘWS* Nvs*XVzJ'ccuK; F۔ts '5~8}6]vZȃV+J2S~JZ8 mcf8O[%>Z噠V޺i|(\_A]O*ӎOZM-|6|dUz8Kޤ4Z cӄr?FI6- =xKiSƪ5Lug/is909'z / (iTʧPSu;͓pd_s':*H2hzr$.F@l}nQ|Fw|pn°?i)dmUc'cUGV̝5F1r}a8kG`Ʒ5uR}X䀼;Ėcx瑪`2ь:hNI&!\]$8`oJjL?C0Se{{dPnQ.\DGY{W9`˓<\'kZ #˒|J(NٛyϐY\E /Qk6:H˓Y8!y=zt3kK DA}r.Vu1%h ɤ\xerc'ꊑiV f?\@TZFx%\Ѯ{``˓tx EPQp h=%`fMi%qQW;B=r8Qbޯc 5X\$0,*ձr3G˓@p ig)K80rhF5M88.\q4B/ endstream endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000596 00000 n 0000004785 00000 n 0000004897 00000 n 0000005012 00000 n 0000005132 00000 n 0000005240 00000 n 0000005368 00000 n 0000005444 00000 n 0000005572 00000 n 0000005652 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 23213 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

Information Security Awareness Training

Tuesday, October 5th, 2021

Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.

So why would a university be targeted?

Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.

Consequences and why it matters:

Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.

A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.

In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.

To access the course, go to https://learn.sun.ac.za. When the SUNLearn main page opens, click on the “Information Security Awareness Training” link and log in with your network username and password. If you’re successfully logged in, scroll down and click on the “Enrol me” button to enrol yourself for the course and to access the training material.

If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via https://learnhelp.sun.ac.za for SUNLearn support.

 

 

 

 

 

Why is cyber security important?

Tuesday, October 5th, 2021

Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.

Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.

Did you know that:

  • As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2
  • 43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began

More tips and resources can be found here

The US government’s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format. 

More tips and resources can be found here

[SOURCE:  Cybersecurity and Infrastructure Security Agency, United States Government

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Microsoft Teams performance tips

Tuesday, July 6th, 2021

Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams meeting has minimum disruptions. The tips are split into three categories:

  1. Good practices
  2. Preparing for a trouble-free meeting
  3. Steps to take if you experience a poor connection

The good practices include:

  1. Regularly shut down and restart your PC – at least once a day. The shut down and restart cleans the PC of processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the morning.
  2. Regularly run updates, ensuring that the operating system and applications are up to date. This should happen almost automatically on University owned PCs.
  3. Regularly run virus checks.

Preparing for a trouble-free meeting – especially important if you are the host or presenter for a meeting:

  1. Close all unnecessary applications.
  2. Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at Speedtest by Ookla – The Global Broadband Speed Test.
    For voice only and sharing images you need less than one MB/second. For sharing applications and using your webcam, you need between 1 and 2 MB/s.
    For video you preferably need 2 MB/s.
  3. Test if your PC has sufficient resources.
    For Windows 10 press Ctrl + Shift + Esc.
    For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field. 
    Start typing “Activity Monitor.”
    The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.
  4. If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your meeting.
    To do this right click the Teams icon on the task bar and Quit, then start again.

5. If you share your Internet with other users (e.g. at home), ensure that the others know and do not hog the Internet connection. (e.g. do not play video, stream content, run updates).
Turn the camera off and use audio only if  the speed test or PC resources tests did show limitations.

6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus where you are unlikely to run into limitations. Use Ethernet (a cable connection to your router) rather than Wi-Fi if you have Ethernet available.

7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice switching devices so that you are familiar with how it works before you host a meeting.

Steps to take if you experience a poor connection:

  1. Turn the camera off if it was on.
  2. Turn off incoming video: (last item under the three dots menu).
    You will still be able to see shared screens and comments.

3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.