%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240925011008+00'00') /ModDate (D:20240925011008+00'00') /Title (Report 09-2024) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 10901 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 169.049 521.469 577.685 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 169.424 520.719 576.935 re S 0.773 0.773 0.773 rg 61.016 184.799 m 550.984 184.799 l 550.984 185.549 l 61.016 185.549 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(STEP UP TO STRONGER PASSWORDS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F1 9.0 Tf [(Weak and reused passwords continue to be a common entry point for account or identity takeover and network )] TJ ET BT 61.016 626.431 Td /F1 9.0 Tf [(intrusions. Simple steps and tools exist to help you achieve unique, strong passwords for your accounts.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [( A password is often all that stands between you and sensitive data. It’s also often all that stands between a cyber criminal )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(step to protect against account theft.)] TJ ET 0.153 0.153 0.153 RG 85.866 567.291 m 85.866 567.703 85.696 568.113 85.404 568.405 c 85.113 568.696 84.703 568.866 84.291 568.866 c 83.878 568.866 83.469 568.696 83.177 568.405 c 82.885 568.113 82.716 567.703 82.716 567.291 c 82.716 566.879 82.885 566.469 83.177 566.177 c 83.469 565.886 83.878 565.716 84.291 565.716 c 84.703 565.716 85.113 565.886 85.404 566.177 c 85.696 566.469 85.866 566.879 85.866 567.291 c f BT 91.016 564.475 Td /F1 9.0 Tf [(Always:)] TJ ET BT 125.027 564.475 Td /F4 9.0 Tf [( Use a unique password for each account so )] TJ ET BT 305.117 564.475 Td /F2 9.0 Tf [(one)] TJ ET BT 320.129 564.475 Td /F4 9.0 Tf [( compromised password does not put )] TJ ET BT 472.193 564.475 Td /F2 9.0 Tf [(all)] TJ ET BT 481.193 564.475 Td /F4 9.0 Tf [( of your )] TJ ET BT 91.016 553.486 Td /F4 9.0 Tf [(accounts at risk of takeover.)] TJ ET 85.866 545.313 m 85.866 545.725 85.696 546.135 85.404 546.427 c 85.113 546.718 84.703 546.888 84.291 546.888 c 83.878 546.888 83.469 546.718 83.177 546.427 c 82.885 546.135 82.716 545.725 82.716 545.313 c 82.716 544.901 82.885 544.491 83.177 544.199 c 83.469 543.908 83.878 543.738 84.291 543.738 c 84.703 543.738 85.113 543.908 85.404 544.199 c 85.696 544.491 85.866 544.901 85.866 545.313 c f BT 91.016 542.497 Td /F1 9.0 Tf [(Good:)] TJ ET BT 117.512 542.497 Td /F4 9.0 Tf [( A good password is 10 or more characters in length, with a combination of uppercase and lowercase )] TJ ET BT 91.016 531.508 Td /F4 9.0 Tf [(letters, plus numbers and/or symbols — such as )] TJ ET BT 285.587 531.508 Td /F2 9.0 Tf [(pAMPh$3let)] TJ ET BT 334.610 531.508 Td /F4 9.0 Tf [(. Complex passwords can be challenging to )] TJ ET BT 91.016 520.519 Td /F4 9.0 Tf [(remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also )] TJ ET BT 91.016 509.530 Td /F4 9.0 Tf [(difficult to type on a smartphone keyboard \(for an easy password management option, see “best” below\).)] TJ ET 85.866 501.357 m 85.866 501.769 85.696 502.179 85.404 502.471 c 85.113 502.762 84.703 502.932 84.291 502.932 c 83.878 502.932 83.469 502.762 83.177 502.471 c 82.885 502.179 82.716 501.769 82.716 501.357 c 82.716 500.945 82.885 500.535 83.177 500.243 c 83.469 499.952 83.878 499.782 84.291 499.782 c 84.703 499.782 85.113 499.952 85.404 500.243 c 85.696 500.535 85.866 500.945 85.866 501.357 c f BT 91.016 498.541 Td /F1 9.0 Tf [(Better:)] TJ ET BT 120.014 498.541 Td /F4 9.0 Tf [( A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional )] TJ ET BT 91.016 487.552 Td /F4 9.0 Tf [(length makes it's exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and )] TJ ET BT 91.016 476.563 Td /F4 9.0 Tf [(more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in )] TJ ET BT 91.016 465.574 Td /F4 9.0 Tf [(uppercase letters, and add a number or symbol to make it even stronger — such as )] TJ ET BT 91.016 454.585 Td /F4 9.0 Tf [(rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read )] TJ ET BT 91.016 443.596 Td /F4 9.0 Tf [(on.)] TJ ET 85.866 435.423 m 85.866 435.835 85.696 436.245 85.404 436.537 c 85.113 436.828 84.703 436.998 84.291 436.998 c 83.878 436.998 83.469 436.828 83.177 436.537 c 82.885 436.245 82.716 435.835 82.716 435.423 c 82.716 435.011 82.885 434.601 83.177 434.309 c 83.469 434.018 83.878 433.848 84.291 433.848 c 84.703 433.848 85.113 434.018 85.404 434.309 c 85.696 434.601 85.866 435.011 85.866 435.423 c f BT 91.016 432.607 Td /F1 9.0 Tf [(Best:)] TJ ET BT 113.516 432.607 Td /F4 9.0 Tf [( The strongest passwords are created by password managers — software that generates and keeps track of )] TJ ET BT 91.016 421.618 Td /F4 9.0 Tf [(complex and unique passwords for all of your accounts. All you need to remember is one complex password or )] TJ ET BT 91.016 410.629 Td /F4 9.0 Tf [(passphrase to access your password manager. With a password manager, you can look up passwords when you )] TJ ET BT 91.016 399.640 Td /F4 9.0 Tf [(need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best )] TJ ET BT 91.016 388.651 Td /F4 9.0 Tf [(practice is to add two-step verification to your password manager account. Keep reading!)] TJ ET 85.866 380.478 m 85.866 380.890 85.696 381.300 85.404 381.592 c 85.113 381.883 84.703 382.053 84.291 382.053 c 83.878 382.053 83.469 381.883 83.177 381.592 c 82.885 381.300 82.716 380.890 82.716 380.478 c 82.716 380.066 82.885 379.656 83.177 379.364 c 83.469 379.073 83.878 378.903 84.291 378.903 c 84.703 378.903 85.113 379.073 85.404 379.364 c 85.696 379.656 85.866 380.066 85.866 380.478 c f BT 91.016 377.662 Td /F1 9.0 Tf [(Step it up!)] TJ ET BT 135.017 377.662 Td /F4 9.0 Tf [( When you use two-step verification \(a.k.a., two-factor authentication or login approval\), a stolen )] TJ ET BT 91.016 366.673 Td /F4 9.0 Tf [(password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive )] TJ ET BT 91.016 355.684 Td /F4 9.0 Tf [(an authorization check on your smartphone or another registered device. Without that second piece, a password )] TJ ET BT 91.016 344.695 Td /F4 9.0 Tf [(thief can’t get into your account. It’s the single best way to protect your account from cyber criminals.)] TJ ET BT 61.016 324.706 Td /F4 9.0 Tf [(https://youtu.be/pMPhBEoVulQ)] TJ ET 0.200 0.200 0.200 rg BT 61.016 302.079 Td /F1 11.7 Tf [(RESOURCES)] TJ ET 0.153 0.153 0.153 rg 85.866 284.247 m 85.866 284.659 85.696 285.069 85.404 285.361 c 85.113 285.652 84.703 285.822 84.291 285.822 c 83.878 285.822 83.469 285.652 83.177 285.361 c 82.885 285.069 82.716 284.659 82.716 284.247 c 82.716 283.835 82.885 283.425 83.177 283.133 c 83.469 282.842 83.878 282.672 84.291 282.672 c 84.703 282.672 85.113 282.842 85.404 283.133 c 85.696 283.425 85.866 283.835 85.866 284.247 c f BT 91.016 281.431 Td /F4 9.0 Tf [(Check out )] TJ ET 0.373 0.169 0.255 rg BT 134.036 281.431 Td /F4 9.0 Tf [(http://twofactorauth.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 134.036 280.280 m 226.088 280.280 l S 0.153 0.153 0.153 rg BT 226.088 281.431 Td /F4 9.0 Tf [( to see a list of services that offer two-step verification.)] TJ ET 0.153 0.153 0.153 RG 85.866 273.258 m 85.866 273.670 85.696 274.080 85.404 274.372 c 85.113 274.663 84.703 274.833 84.291 274.833 c 83.878 274.833 83.469 274.663 83.177 274.372 c 82.885 274.080 82.716 273.670 82.716 273.258 c 82.716 272.846 82.885 272.436 83.177 272.144 c 83.469 271.853 83.878 271.683 84.291 271.683 c 84.703 271.683 85.113 271.853 85.404 272.144 c 85.696 272.436 85.866 272.846 85.866 273.258 c f BT 91.016 270.442 Td /F4 9.0 Tf [(Learn more about )] TJ ET 0.373 0.169 0.255 rg BT 164.555 270.442 Td /F4 9.0 Tf [(passwords and securing your accounts)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 164.555 269.291 m 320.120 269.291 l S 0.153 0.153 0.153 rg BT 320.120 270.442 Td /F4 9.0 Tf [( from the National Cyber Security Alliance.)] TJ ET 0.153 0.153 0.153 RG 85.866 262.269 m 85.866 262.681 85.696 263.091 85.404 263.383 c 85.113 263.674 84.703 263.844 84.291 263.844 c 83.878 263.844 83.469 263.674 83.177 263.383 c 82.885 263.091 82.716 262.681 82.716 262.269 c 82.716 261.857 82.885 261.447 83.177 261.155 c 83.469 260.864 83.878 260.694 84.291 260.694 c 84.703 260.694 85.113 260.864 85.404 261.155 c 85.696 261.447 85.866 261.857 85.866 262.269 c f BT 91.016 259.453 Td /F4 9.0 Tf [(Consider whether a )] TJ ET 0.373 0.169 0.255 rg BT 171.548 259.453 Td /F4 9.0 Tf [(password manager)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 171.548 258.302 m 248.075 258.302 l S 0.153 0.153 0.153 rg BT 248.075 259.453 Td /F4 9.0 Tf [( is the right choice for you.)] TJ ET 0.153 0.153 0.153 RG 85.866 251.280 m 85.866 251.692 85.696 252.102 85.404 252.394 c 85.113 252.685 84.703 252.855 84.291 252.855 c 83.878 252.855 83.469 252.685 83.177 252.394 c 82.885 252.102 82.716 251.692 82.716 251.280 c 82.716 250.868 82.885 250.458 83.177 250.166 c 83.469 249.875 83.878 249.705 84.291 249.705 c 84.703 249.705 85.113 249.875 85.404 250.166 c 85.696 250.458 85.866 250.868 85.866 251.280 c f BT 91.016 248.464 Td /F4 9.0 Tf [(Explore )] TJ ET 0.373 0.169 0.255 rg BT 124.028 248.464 Td /F4 9.0 Tf [(Five Ways to Upgrade your Password this Password Day)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 124.028 247.313 m 352.097 247.313 l S 0.153 0.153 0.153 rg BT 352.097 248.464 Td /F4 9.0 Tf [(, which is observed in May each year.)] TJ ET 0.153 0.153 0.153 RG 85.866 240.291 m 85.866 240.703 85.696 241.113 85.404 241.405 c 85.113 241.696 84.703 241.866 84.291 241.866 c 83.878 241.866 83.469 241.696 83.177 241.405 c 82.885 241.113 82.716 240.703 82.716 240.291 c 82.716 239.879 82.885 239.469 83.177 239.177 c 83.469 238.886 83.878 238.716 84.291 238.716 c 84.703 238.716 85.113 238.886 85.404 239.177 c 85.696 239.469 85.866 239.879 85.866 240.291 c f BT 91.016 237.475 Td /F4 9.0 Tf [(Find more videos and a quiz at )] TJ ET 0.373 0.169 0.255 rg BT 216.575 237.475 Td /F4 9.0 Tf [(http://passwordday.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 216.575 236.324 m 307.619 236.324 l S 0.153 0.153 0.153 rg BT 307.619 237.475 Td /F4 9.0 Tf [(.)] TJ ET BT 61.016 217.486 Td /F4 9.0 Tf [( )] TJ ET 0.400 0.400 0.400 rg BT 61.016 198.997 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Password,Security | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 134.0357 280.5985 226.0877 289.7560 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://twofactorauth.org/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 164.5547 269.6095 320.1197 278.7670 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://staysafeonline.org/stay-safe-online/protect-your-personal-information/passwords-and-securing-your-accounts) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 171.5477 258.6205 248.0747 267.7780 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://library.educause.edu/resources/2015/7/password-managers) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 124.0277 247.6315 352.0967 256.7890 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (http://nakedsecurity.sophos.com/2016/05/05/dont-do-it-5-ways-to-upgrade-your-passwords-this-passwordday/) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 216.5747 236.6425 307.6187 245.8000 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://passwordday.org/) >> endobj xref 0 22 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000582 00000 n 0000011536 00000 n 0000011648 00000 n 0000011763 00000 n 0000011883 00000 n 0000011991 00000 n 0000012119 00000 n 0000012196 00000 n 0000012324 00000 n 0000012489 00000 n 0000012617 00000 n 0000012731 00000 n 0000012859 00000 n 0000013015 00000 n 0000013143 00000 n trailer << /Size 22 /Root 1 0 R /Info 5 0 R >> startxref 13218 %%EOF password « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

password

Cybersecurity Awareness Month: Creating strong passwords

Tuesday, October 5th, 2021

Before we pointed out that most people underestimate the importance of having a secure password, and still make the mistake of using simple words and numbers as a password.

Keep in mind that your email and social network accounts contain very personal information about you. You must have a strong password to keep your personal life personal, and not become a victim of identity theft. 

  • Using email or your profile on Facebook, Whatsapp or Google, hackers can and do, extract a huge amount of personal data of your personal “online” life.
  • If you use the same password for multiple online accounts, you run the risk, if this password is hacked, of all your online accounts being compromised.
  • Using a personal name for an online account, the name of the city that you live in, the names of your children or your date of birth, give hackers vital clues for attempting to access your personal data.
  • For an average expert hacker, it is always easy to find passwords that are made up of words from the English vocabulary or other languages, using a basic technique called “brute force” or “dictionary” attacks.

What makes a password safe?

  1. A password at least 8 characters long.
  2. The password does not contain information that is easy to find online, such as the date of birth, the telephone number, your spouse’s name, the name of a pet, or a child’s name.
  3. The password does not contain words found in the dictionary.
  4. The password contains special characters like @ # $% ^ &, and numbers.
  5. The password uses a combination of uppercase and lowercase letters.

A trick that the experts use to create secure passwords:

Think of a phrase and use the first letters of the words in the phrase.

  • For example: “In South Africa, a barbecue is called a Braai!”
  • Take the first letters of each word and the password that is created is ISAabicaB!
  • This will be very difficult to guess, but easy to remember.
  • At this point, you can decide to make your the Google password is ISAabicaB!-G,  and Facebook ISAabicaB!-F and your university account  ISAabicaB!-US and so on.
  • There is already a capital letter and a special character (!), so you just need to add a number to finish off a good password like 9-ISAabicaB!-US (9 could be the month you created the password in – for example)

You will have already made your password a lot more difficult to hack, and it can be a lot of fun to create. 

Step Up to Stronger Passwords

Tuesday, October 5th, 2021

Weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions. Simple steps and tools exist to help you achieve unique, strong passwords for your accounts.

 A password is often all that stands between you and sensitive data. It’s also often all that stands between a cyber criminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft.

  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes it’s exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or another registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cyber criminals.

Resources

 

One password less

Thursday, May 12th, 2016

We have good news for everyone who struggles to remember a plethora of passwords. Soon there will be one less when we simplify AIS/Tera Term’s login procedure.  

This new development means that you will soon be able to log into sun022, the system which, among others, hosts Tera Term, with your standard network username and password.

Phase one of the process is a “soft roll-out”, where SSO (Same Sign On) will be implemented. During this period, you will still be able to log in with your network username or, until it expires, with your existing AIS username. When your AIS password expires, the IT Service desk will not be able to reset it and you will have to start using your network username and password.

The primary AIS usernames of current AIS users (with more than one AIS username) will be connected to their network username.

After SSO is implemented, newly created AIS users’ usernames will be set to their SU number. This also implies that AIS usernames, roles, and functions will not be reused.

Take note that passwords for these functions should not be shared among staff and that, in doing so, the Electronic Communications Policy is violated. The new SSO approach also means that one password will give also give you access to your private Human Resources information. In other words, if you share your password, you also share your personal information.

For any enquiries, please contact the IT Service desk at 808 4367.

What’s wrong with your password?

Friday, October 10th, 2014

Passwords are an important aspect of computer security and your electronic key to the network of Stellenbosch University. But which passwords work best? 

Lorrie Faith Cranor is a security researcher and an Associate Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. In March of this year she presented a TED talk on her study of thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security.

Watch her very interesting talk on her research on passwords below. After watching Lorrie’s talk you might also want to change your own password. On how to do that and more password tips, have a look at our wiki or make use of the self help function online.

http://www.ted.com/talks/lorrie_faith_cranor_what_s_wrong_with_your_pa_w0rd

Password synchronisation giving you a headache?

Friday, August 31st, 2012

Every 90 days you receive an email from helpinfo@sun.ac.za asking you nicely to change your password. We all know that, although it’s a bit of a nuisance, it’s also necessary for security reasons. But is there a way to simplify the process?

In 2007 Microsoft Research conducted a study and found that the average user has 6.5 internet passwords, each person has approximately 25 accounts with passwords and has to enter 8 passwords per day.  And this was in 2007 – imagine what the statistics will look like 5 years later.

If you use more than one device, password changes can become a nightmare. But there are a few steps you can follow to make sure it goes a bit smoother.

Switch off all your devices except for one, for example your laptop.

Sign on at http://www.sun.ac.za/useradm, select the Change Password option and select a new password according to the guidelines supplied on the website. Log out of the network with the Logout option given on http://www.sun.ac.za/useradm. Log onto the network with your new password. Make sure you can access all your network applications – email, internet and networkspace. Switch on all the other devices and type in your new password.

Remember, you can change your password any time at http://www.sun.ac.za/useradm with the Change Password option. Try to stick to the guidelines to ensure you have a secure password – it will safe you a lot of effort and frustration in the long run. If you’ve forgotten your password, you can also reset is by browsing to staff portal.

More information and hints on password changes can be found at https://stbsp01.stb.sun.ac.za/innov/it/it-help/Wiki%20Pages/Change%20password.aspx

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.