{"id":15416,"date":"2021-08-02T10:39:19","date_gmt":"2021-08-02T08:39:19","guid":{"rendered":"https:\/\/blogs.sun.ac.za\/it\/?p=15416"},"modified":"2021-08-03T15:19:49","modified_gmt":"2021-08-03T13:19:49","slug":"extra-layer-of-security-to-campus-computers","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2021\/08\/extra-layer-of-security-to-campus-computers\/","title":{"rendered":"[:en]Extra layer of security added to campus computers [:af]Ekstra vlak van sekuriteit vir rekenaars op kampus [:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it&#8217;s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here&#8217;s a breakdown of the basics:\u00a0<\/p>\n<p><strong>Malware<\/strong>, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.<\/p>\n<p><strong>Ransomware<\/strong> is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.<\/p>\n<p><strong>Adware<\/strong> is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.<\/p>\n<p><strong>Spyware<\/strong> is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.<\/p>\n<p>The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.<\/p>\n<p>You&#8217;ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don&#8217;t worry, this isn&#8217;t a brand-new type of malware. Stellenbosch University&#8217;s IT department has added an extra layer of security to campus computers.<\/p>\n<p>Figure 1<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15417\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes.png\" alt=\"\" width=\"76\" height=\"92\" \/><\/p>\n<p>Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).<\/p>\n<p>Figure 2<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-15418\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2-300x243.png\" alt=\"\" width=\"300\" height=\"243\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2-300x243.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2.png 482w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.\u00a0 If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the <a href=\"https:\/\/servicedesk.sun.ac.za\/jira\/plugins\/servlet\/theme\/portal\/6\">ICT Partner Portal<\/a> for a technician to assist with further remediation.<\/p>\n<p style=\"text-align: right;\">[ARTICLE BY BRADLEY VAN DER VENTER]<\/p>\n<p>[:af]<\/p>\n<p>Kubermisdaad is \u0149 veld wat voortdurend ontwikkel. Alhoewel die groter meerderheid virusse aanvanklik as poetse geskep is, is dit deesdae noodsaaklik om op hoogte te bly met die verskeie risiko&#8217;s op die internet as jy veilig aanlyn wil wees. Hier is \u0149 kort opsomming van die basiese gevare:\u00a0<\/p>\n<p><em><strong>Malware<\/strong><\/em>, of <em>malicious software<\/em>, is \u0149 oorkoepelende term vir enige kwaadwillige rekenaarprogram. Malware is die mees algemene vorm van aanlyn-bedreiging.\u00a0<\/p>\n<p><em><strong>Ransomware<\/strong><\/em> is \u0149 nuwe vorm van <em>malware<\/em> wat gebruikers se toegang tot dokumente of toestelle sluit en dan anoniem \u0149 aanlynbetaling eis om toegang te herstel.\u00a0<\/p>\n<p><em><strong>Adware<\/strong><\/em> is \u0149 vorm van <em>malware<\/em> wat versteek is op jou toestel en advertensies aan jou vertoon. Sommige <em>adware<\/em> monitor ook jou aanlyngedrag sodat dit pasgemaakte advertensies vir jou kan wys.\u00a0<\/p>\n<p><em><strong>Spyware<\/strong><\/em> is \u0149 vorm van <em>malware<\/em> wat versteek is op jou toestel, jou aktiwiteite monitor en sensitiewe data soos bankinligting en wagwoorde steel.\u00a0<\/p>\n<p>Die w\u00eareld van kubermisdaad is soortgelyk aan die van tegnologie. Elke jaar is daar nuwe tendense, deurbrake en hulpmiddele.\u00a0<\/p>\n<p>Jy het moontlik opgemerk dat daar onlangs \u0149 <em>Malwarebytes Threat Scan<\/em> ikoon op jou skootrekenaar of tafelrekenaar se skerm verskyn het (Figuur 1). Moenie skrik nie, dis nie \u0149 nuwe tipe malware nie! Universiteit Stellenbosch se IT-afdeling het \u0149 ekstra vlak van sekuriteit op kampusrekenaars bygevoeg.\u00a0<\/p>\n<p>Figuur 1<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15417\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes.png\" alt=\"\" width=\"76\" height=\"92\" \/><\/p>\n<p><em>Malwarebytes Incident Response<\/em> is vertroude standaard in outomatiese eindpunt remediasie. Ongelukkig, onder huidige omstandighede, beteken dit dat sommige malware kan terugkeer nadat dit verwyder is. Indien dit gebeur sal <em>Malwarebytes<\/em> jou aanpor om jou rekenaar af en aan te sit, soos aangedui in Figuur 2.<\/p>\n<p>Figuur 2<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-15418\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2-300x243.png\" alt=\"\" width=\"300\" height=\"243\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2-300x243.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2021\/08\/malwarebytes2.png 482w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Dit gebeur omdat die<em> malware<\/em> moet sinkroniseer met jou webblaaier se profiel. Dit sal weer terug sinkroniseer met jou toestel nadat dit verwyder is. Indien jy daagliks sulke versoeke van <em>Malwarebytes<\/em> kry om jou rekenaar af te sit, stel ons voor dat jy \u0149 versoek aanteken op die <a href=\"https:\/\/servicedesk.sun.ac.za\/jira\/plugins\/servlet\/theme\/portal\/6\">ICT Partner Portal<\/a> sodat \u0149 tegnikus jou kan help.\u00a0<\/p>\n<p style=\"text-align: right;\">[ARTIKEL DEUR BRADLEY VAN DER VENTER]<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it&#8217;s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here&#8217;s a breakdown of the basics:\u00a0 Malware, or malicious software, is a catch-all term for any [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3256,48738,20381,29187,48737,44],"tags":[],"class_list":["post-15416","post","type-post","status-publish","format-standard","hentry","category-news","category-notices-2","category-phishing","category-security-2","category-tips-2","category-training"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 11:51:47","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=15416"}],"version-history":[{"count":7,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15416\/revisions"}],"predecessor-version":[{"id":15432,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15416\/revisions\/15432"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=15416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=15416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=15416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}