{"id":15524,"date":"2021-10-05T16:57:06","date_gmt":"2021-10-05T14:57:06","guid":{"rendered":"https:\/\/blogs.sun.ac.za\/it\/?p=15524"},"modified":"2021-10-05T17:01:48","modified_gmt":"2021-10-05T15:01:48","slug":"information-security-awareness-training","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2021\/10\/information-security-awareness-training\/","title":{"rendered":"[:en]Information Security Awareness Training[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2021\/10\/classroom-470680_640-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" align=\"right\" \/>Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.<\/p>\n<p><strong>So why would a university be targeted?<\/strong><\/p>\n<p>Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.<\/p>\n<p><strong>Consequences and why it matters:<\/strong><\/p>\n<p>Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.<\/p>\n<p>A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.<\/p>\n<p>In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.<\/p>\n<p>To access the course, go to\u00a0<a href=\"https:\/\/learn.sun.ac.za\/\">https:\/\/learn.sun.ac.za<\/a>. When the SUNLearn main page opens, click on the &#8220;Information Security Awareness Training&#8221; link and log in with your network username and password. If you&#8217;re successfully logged in, scroll down and click on the &#8220;Enrol me&#8221; button to enrol yourself for the course and to access the training material.<\/p>\n<p>If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via\u00a0<a href=\"https:\/\/learnhelp.sun.ac.za\/\">https:\/\/learnhelp.sun.ac.za<\/a>\u00a0for SUNLearn support.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day. So why would a university be targeted? Universities hold a great deal of information that could be exploited if it gets into the [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3256,48738,29187,44],"tags":[],"class_list":["post-15524","post","type-post","status-publish","format-standard","hentry","category-news","category-notices-2","category-security-2","category-training"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 17:08:19","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=15524"}],"version-history":[{"count":2,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15524\/revisions"}],"predecessor-version":[{"id":15527,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15524\/revisions\/15527"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=15524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=15524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=15524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}