Motivation Tuesday


Motivation Tuesday

Motlokwe Thobejane, VC's IT Director, started an initiative called motivation Tuesday –which provides members of the team the opportunity to share
a motivational message, be it in the form of a short video clip,audio, song, article, blog entry, or the like. It started with the

Windows Update Error


Issues currently being experienced with Windows updates....

R in a day


Click the image so visit the website

IT@NWU WORD Training


IT@NWU: Training

Click the image to visit our IT training website

Password Notification System


Please take note of the New Password Notification System that will be sent before a password expires. All users will receive a notification when their password is about to expire. The notification will be sent via email on 3 occasions: five, two and one day, before your password expires.   Please change your password immediately if you receive this notification. Please go to

Ransomware tips to protect yourself


RANSOMEWARE A growing cyber security threat - but there are things you can do...


Fix your incorrect browser caching for the NWU website


*/ /*-->*/

After recent issues with the NWU website, it has come to our attention that some people may still see the web errors on their own individual devices (even though the site is up and running):



Office Telephones: Change Service Class & Pick Groups


Office Telephones: Change Service Class & Pick Groups


The Service Class determines what type of calls may be made from the extension, e.g. Internal (on campus or between campuses) or International.

Pick groups enable a pre-set group of extensions to answer each other’s calls from any extension in the group.


SM-how-to-Log A Ticket


Introducing the new IT-Help:  Why are we changing? The benefits of the new system are as follows...

 Develop and implement a single and repeatable Incident Management and Request

Fulfillment solution to replace “IT-Help”.

Clearly define the roles and responsibilities required to execute the activities of Incident

Management and Request Fulfillment processes.

What added features benefit the change?

To align all IT staff and student service desks of the three campuses.

 Identify the key policies that support the Incident Management and Request Fulfillment


NWU Raspberry Pi Hackathon, Open Access Week - 11 October 2018


*/ /*-->*/

The NWU along with Enactus will be hosting a Raspberry Pi Hackathon on 11 October 2018 as a preliminary to the International Open Access Week of 2018.


NWU Raspberry Pi Hackathon, Open Access Week - 27 & 28 October 2016


Calling on all educators, learners, students, researchers, tech-lovers…

What is phishing emails?


Phishing is a scam where e-mail is sent to people to fool them into revealing private information that can be used for identity theft.  In this video, you will learn about Phishing and how to protect yourself from Phishing scams.

To learn more about phishing, click on the link...


Single sign-on


Too many passwords?

Single Sign-On (SSO) is mechanism whereby a single action of user authentication and authorization (NWU# and password) can permit a user to access all computers and systems where he has access permission, without the need to enter multiple passwords.

What is the benefit?

Single sign-on reduces any error and frustration that might occur during login. Click to follow the guidelines...



IT@NWU Annual yearbook


IT  always  aims  to  align  itself    with    the    institutional vision,   mission   and   goals,   and  whenever  there  are  major    changes    we    re-evaluate  our    current  strategies.    An   exciting  2018  awaits.  Click the image to Reflect with us on 2017.

Nate 2018


National ASAUDIT Technology Event: 19-21 June 2018 IT@NWU  have again won the prize for the most presentations at NATE...

 Click to

The purpose of ASAUDIT is to promote and advance the use and support of computing.

Stressed person lost his data

Back IT UP


Personal Backup Plan? Do you have one?

The only way to protect yourself against valuable data loss is through regular backups. Ideally, important files should be backed up at minimum once a week, or every day, depending on how critical they are to you. Click to view Infographic

Picture of a hand stating Stop Ransomware

Stop Ransomware


"Ransomware is a type of attack that encrypts your computer, phones, or mobile devices. Hackers will then demand that you pay a ransom to regain access to your information. Once a device is infected, it's too late to recover the "hostage" information. Everyone should understand the effects of ransomware and be prepared before an attack occurs. Increase awareness on your campus by customizing and sharing the following content."  Read more

Or alternatively see infographic for a quick overview

5 Outrageous email statistics


Almost half of all email content is spam! Only 55% of emails contain legitimate content, while the rest falls into the spam category.

Clearly, our spam filters are working harder than ever – but how many spam emails is that in total? read more...


Meet Motlokwe Thobejane newly appointed Director IT Vaal Triangle Campus


Besides VTC’s IT director, Motlokwe Thobejane is “co-founder of Mohlotlo Thuto Foundation. He is a blogger, and also United Nations (UN) Volunteer. Motlokwe is an IT specialist and holds a Master of Philosophy (MPhil) in Informatics. He is passionate about writing, education and youth development.”  On 2 March 2018, one month after he joined IT on 1 February, Motlokwe Thobejane appeared on an episode of BUAtv where the focus was on Information Technology. He gave invaluable information with regards to why the IT department is doing so much more than meets the eye… To view this episode, visit:

Data Carpentry Workshop


Data Carpentry develops and teaches workshops on the fundamental data skills needed to conduct research. Its target audience is researchers who have little to no prior computational experience, and its lessons are domain specific, building on learners' existing knowledge to enable them to quickly apply skills learned to their own research. Participants will be encouraged to help one another and to apply what they have learned to their own research problems.  More information...

Online Cyber Security Advice

Online Cyber Security Advice


The internet is a shared resource, and securing it is Our Shared Global Responsibility.

Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Strengthen online accounts and use strong authentication tools - like biometrics, security keys or a unique, one-time code through an app on your mobile device - whenever offered.

Keep all software on internet-connected devices - including personal computers, smartphones and tablets - current to reduce risk of infection from ransomware and malware.

Picture for physical security

Beef up your physical security


With the threat of hacking, malware, phishing, and other digital threats constantly looming, it can be easy to overlook the importance of communicating physical security. A few basic physical security tips can substantially improve the security risk profile. Read more...

Click to view video

Picture of the Top 10 IT Issues in higher education

Top 10 IT issues 2018 in Higher Education


Educause Research Snapshot

The 2018 Top Ten IT issues shows how digital technology is remaking higher education through four key themes: 

Institutional adaptiveness Improved student outcomes Improved decision-making IT adaptiveness

click to

figshare pilot credit for all your research


The NWU Library and Information Service in conjunction with IT services and the Research Office as part of eResearch initiative is running a 6 month pilot of the figshare platform which started at the beginning of April 2018. NWU figshare pilot platform may be accessed here :

Click picture to read more

2018 Key Issues in Teaching and Learning


Each year, ELI surveys the higher education community to determine key issues and opportunities in post-secondary teaching and learning. These key issues serve as the framework, or focal points, for our discussions and programming throughout the coming year. More than 900 community members voted on the following key issues for 2018.

Click to download more information...

Cybersecurity 101 Cyber Privacy


Learn what can happen when you post information online with this video from the NOVA Cybersecurity Lab. When you upload something to a social media site, that information is stored on the website’s server. People can access your information from a website’s server, including governments, advertisers, and identity thieves. You could unintentionally reveal personal information, including your full name, address, and phone number through an innocent post. Identity thieves can use this information to access your bank account and the accounts of your friends, jeopardizing their personal information, too. In fact, over 10 million Americans have their identities stolen every year.  Click  to view video

First Carpentries Instructor Workshop of 2018


On 21-23 February 2018, the fourth South African Carpentries instructor training for African based instructors took place in Kleinmond, Western Cape.

Cybersecurity 101 Cyber Codes

Cybersecurity 101 Cyber Codes


Learn how encryption keeps online information private in this video from the NOVA Cybersecurity Lab. Your messages are coded by email programs and websites to prevent others from reading them. Codes have been used in messages for centuries.  Caesar sent coded messages to his military in ancient Rome. In the 1940s, the Allied forces cracked the German Enigma Code, saving lives during World War II. Today, emails are protected through public-key cryptography, which uses numbers from both the sending and receiving email servers to create a key. However, not all online activity is encrypted and in some cases your browsing history, text messages, and data from apps can be intercepted.

Picture of the attendees of the carpentry workshop

First of its kind


First Carpentries Instructor Workshop of 2018   

On 21-23 February 2018, the fourth South African Carpentries instructor training for African based instructors took place in Kleinmond, Western Cape. The workshop was funded through the Rural Campuses Connection Project Phase II (RCCPII) Tertiary.  Read more...

The secret life of hackers


Learn about different types of hackers with this video from the NOVA Cybersecurity Lab. Hacking is solving problems in creative or unexpected ways. Hacks have been used for everything from Galileo’s telescope to Apollo 13. Similarly, there are many reasons that people hack computers. Some are just curious about how systems work, others hack to find and fix security flaws before they are exploited by criminals. Some hackers have bad intentions fueled by greed, attention, or rebellion. There are some hackers who have good intentions, but use questionable methods of getting information. “Hacking” isn’t good or bad – it depends on how and why people hack.

Picture of a lock to suggest password handling and security

Password Handling


Your password expires every 90 days.  This is the password you use in conjunction with your NWU# to gain access to the majority of IT services.

With this in mind - always use hard to guess passwords

Don't use obvious passwords like "password," "cat," or obvious character sequences on the qwerty keyboard like "asdfg" and "12345." It's better to use complex passwords. Include different letter cases, numbers, and even punctuation. Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren't compromised watch the video.

Cybersecurity 101


Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab.

Telkom Automated Teleconferencing


Telkom's automated teleconferencing: “allows any business, big or small, to make and enact decisions in real time, in response to current events...”

(Click on the image above to download the procedure)


IT Self-Help postcards


IT Self-Help postcards click here for complete information set

A quick and easy way to answer your most pressing IT questions / 'n Handige hulpmiddel, indien u opsoek is na 'n vinnige IT antwoord.



NWU hosts largest computer programming school in Africa


The NWU Center for Space Research and NWU eResearch, in conjunction with the Centre for High Performance Computing (CHPC), hosted the 8th CHPC Introductory summer school at the Potchefstroom site.

NWU hosts the largest computer programming school in Africa