Information Technology
IT News 2018
![]() |
Motivation Tuesday20-11-2018Motivation Tuesday Motlokwe Thobejane, VC's IT Director, started an initiative called motivation Tuesday –which provides members of the team the opportunity to share |
![]() |
Windows Update Error16-11-2018Issues currently being experienced with Windows updates.... |
![]() |
R in a day15-11-2018Click the image so visit the website |
![]() |
IT@NWU WORD Training01-11-2018IT@NWU: Training Click the image to visit our IT training website |
![]() |
Password Notification System12-10-2018Please take note of the New Password Notification System that will be sent before a password expires. All users will receive a notification when their password is about to expire. The notification will be sent via email on 3 occasions: five, two and one day, before your password expires. Please change your password immediately if you receive this notification. Please go to https://password.nwu.ac.za |
![]() |
Ransomware tips to protect yourself01-10-2018RANSOMEWARE A growing cyber security threat - but there are things you can do...
|
![]() |
Fix your incorrect browser caching for the NWU website25-09-2018*/ /*-->*/ After recent issues with the NWU website, it has come to our attention that some people may still see the web errors on their own individual devices (even though the site is up and running): Examples:
|
![]() |
Office Telephones: Change Service Class & Pick Groups25-09-2018Office Telephones: Change Service Class & Pick Groups
The Service Class determines what type of calls may be made from the extension, e.g. Internal (on campus or between campuses) or International. Pick groups enable a pre-set group of extensions to answer each other’s calls from any extension in the group.
|
![]() |
SM-how-to-Log A Ticket28-08-2018Introducing the new IT-Help: Why are we changing? The benefits of the new system are as follows... Develop and implement a single and repeatable Incident Management and Request Fulfillment solution to replace “IT-Help”. Clearly define the roles and responsibilities required to execute the activities of Incident Management and Request Fulfillment processes. What added features benefit the change?To align all IT staff and student service desks of the three campuses. Identify the key policies that support the Incident Management and Request Fulfillment processes. |
![]() |
NWU Raspberry Pi Hackathon, Open Access Week - 11 October 201817-08-2018*/ /*-->*/ The NWU along with Enactus will be hosting a Raspberry Pi Hackathon on 11 October 2018 as a preliminary to the International Open Access Week of 2018.
|
![]() |
NWU Raspberry Pi Hackathon, Open Access Week - 27 & 28 October 201617-08-2018Calling on all educators, learners, students, researchers, tech-lovers… |
![]() |
What is phishing emails?13-08-2018Phishing is a scam where e-mail is sent to people to fool them into revealing private information that can be used for identity theft. In this video, you will learn about Phishing and how to protect yourself from Phishing scams. To learn more about phishing, click on the link...
|
![]() |
Single sign-on16-07-2018Too many passwords? Single Sign-On (SSO) is mechanism whereby a single action of user authentication and authorization (NWU# and password) can permit a user to access all computers and systems where he has access permission, without the need to enter multiple passwords. What is the benefit?Single sign-on reduces any error and frustration that might occur during login. Click to follow the guidelines...
|
![]() |
IT@NWU Annual yearbook03-07-2018IT always aims to align itself with the institutional vision, mission and goals, and whenever there are major changes we re-evaluate our current strategies. An exciting 2018 awaits. Click the image to Reflect with us on 2017. |
![]() |
Nate 201822-06-2018National ASAUDIT Technology Event: 19-21 June 2018 IT@NWU have again won the prize for the most presentations at NATE... Click to read more... The purpose of ASAUDIT is to promote and advance the use and support of computing. |
![]() |
Back IT UP19-06-2018Personal Backup Plan? Do you have one? The only way to protect yourself against valuable data loss is through regular backups. Ideally, important files should be backed up at minimum once a week, or every day, depending on how critical they are to you. Click to view Infographic |
![]() |
Stop Ransomware13-06-2018"Ransomware is a type of attack that encrypts your computer, phones, or mobile devices. Hackers will then demand that you pay a ransom to regain access to your information. Once a device is infected, it's too late to recover the "hostage" information. Everyone should understand the effects of ransomware and be prepared before an attack occurs. Increase awareness on your campus by customizing and sharing the following content." Read more Or alternatively see infographic for a quick overview |
![]() |
5 Outrageous email statistics06-06-2018Almost half of all email content is spam! Only 55% of emails contain legitimate content, while the rest falls into the spam category. Clearly, our spam filters are working harder than ever – but how many spam emails is that in total? read more...
|
![]() |
Meet Motlokwe Thobejane newly appointed Director IT Vaal Triangle Campus23-05-2018Besides VTC’s IT director, Motlokwe Thobejane is “co-founder of Mohlotlo Thuto Foundation. He is a blogger, and also United Nations (UN) Volunteer. Motlokwe is an IT specialist and holds a Master of Philosophy (MPhil) in Informatics. He is passionate about writing, education and youth development.” On 2 March 2018, one month after he joined IT on 1 February, Motlokwe Thobejane appeared on an episode of BUAtv where the focus was on Information Technology. He gave invaluable information with regards to why the IT department is doing so much more than meets the eye… To view this episode, visit: https://www.youtube.com/watch?v=GtelB3PwX1I |
![]() |
Data Carpentry Workshop10-05-2018Data Carpentry develops and teaches workshops on the fundamental data skills needed to conduct research. Its target audience is researchers who have little to no prior computational experience, and its lessons are domain specific, building on learners' existing knowledge to enable them to quickly apply skills learned to their own research. Participants will be encouraged to help one another and to apply what they have learned to their own research problems. More information... |
![]() |
Online Cyber Security Advice07-05-2018The internet is a shared resource, and securing it is Our Shared Global Responsibility. LOCK DOWN YOUR LOGIN KEEP A CLEAN MACHINE |
![]() |
Beef up your physical security03-05-2018With the threat of hacking, malware, phishing, and other digital threats constantly looming, it can be easy to overlook the importance of communicating physical security. A few basic physical security tips can substantially improve the security risk profile. Read more... Click to view video |
![]() |
Top 10 IT issues 2018 in Higher Education16-04-2018Educause Research Snapshot The 2018 Top Ten IT issues shows how digital technology is remaking higher education through four key themes: Institutional adaptiveness Improved student outcomes Improved decision-making IT adaptivenessclick to read more... |
![]() |
figshare pilot credit for all your research11-04-2018The NWU Library and Information Service in conjunction with IT services and the Research Office as part of eResearch initiative is running a 6 month pilot of the figshare platform which started at the beginning of April 2018. NWU figshare pilot platform may be accessed here : https://nwu.figshare.com Click picture to read more |
![]() |
2018 Key Issues in Teaching and Learning22-03-2018Each year, ELI surveys the higher education community to determine key issues and opportunities in post-secondary teaching and learning. These key issues serve as the framework, or focal points, for our discussions and programming throughout the coming year. More than 900 community members voted on the following key issues for 2018. Click to download more information... |
![]() |
Cybersecurity 101 Cyber Privacy12-03-2018Learn what can happen when you post information online with this video from the NOVA Cybersecurity Lab. When you upload something to a social media site, that information is stored on the website’s server. People can access your information from a website’s server, including governments, advertisers, and identity thieves. You could unintentionally reveal personal information, including your full name, address, and phone number through an innocent post. Identity thieves can use this information to access your bank account and the accounts of your friends, jeopardizing their personal information, too. In fact, over 10 million Americans have their identities stolen every year. Click to view video |
![]() |
First Carpentries Instructor Workshop of 201812-03-2018On 21-23 February 2018, the fourth South African Carpentries instructor training for African based instructors took place in Kleinmond, Western Cape. |
![]() |
Cybersecurity 101 Cyber Codes08-03-2018Learn how encryption keeps online information private in this video from the NOVA Cybersecurity Lab. Your messages are coded by email programs and websites to prevent others from reading them. Codes have been used in messages for centuries. Caesar sent coded messages to his military in ancient Rome. In the 1940s, the Allied forces cracked the German Enigma Code, saving lives during World War II. Today, emails are protected through public-key cryptography, which uses numbers from both the sending and receiving email servers to create a key. However, not all online activity is encrypted and in some cases your browsing history, text messages, and data from apps can be intercepted. |
![]() |
First of its kind08-03-2018First Carpentries Instructor Workshop of 2018 On 21-23 February 2018, the fourth South African Carpentries instructor training for African based instructors took place in Kleinmond, Western Cape. The workshop was funded through the Rural Campuses Connection Project Phase II (RCCPII) Tertiary. Read more... |
![]() |
The secret life of hackers26-02-2018Learn about different types of hackers with this video from the NOVA Cybersecurity Lab. Hacking is solving problems in creative or unexpected ways. Hacks have been used for everything from Galileo’s telescope to Apollo 13. Similarly, there are many reasons that people hack computers. Some are just curious about how systems work, others hack to find and fix security flaws before they are exploited by criminals. Some hackers have bad intentions fueled by greed, attention, or rebellion. There are some hackers who have good intentions, but use questionable methods of getting information. “Hacking” isn’t good or bad – it depends on how and why people hack. |
![]() |
Password Handling26-02-2018Your password expires every 90 days. This is the password you use in conjunction with your NWU# to gain access to the majority of IT services. With this in mind - always use hard to guess passwords Don't use obvious passwords like "password," "cat," or obvious character sequences on the qwerty keyboard like "asdfg" and "12345." It's better to use complex passwords. Include different letter cases, numbers, and even punctuation. Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren't compromised watch the video. |
![]() |
Cybersecurity 10120-02-2018Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab. |
![]() |
Telkom Automated Teleconferencing16-02-2018Telkom's automated teleconferencing: “allows any business, big or small, to make and enact decisions in real time, in response to current events...” (Click on the image above to download the procedure)
|
![]() |
IT Self-Help postcards07-02-2018IT Self-Help postcards click here for complete information set A quick and easy way to answer your most pressing IT questions / 'n Handige hulpmiddel, indien u opsoek is na 'n vinnige IT antwoord.
|
![]() |
NWU hosts largest computer programming school in Africa24-01-2018The NWU Center for Space Research and NWU eResearch, in conjunction with the Centre for High Performance Computing (CHPC), hosted the 8th CHPC Introductory summer school at the Potchefstroom site. |
![]() |
NWU hosts the largest computer programming school in Africa22-01-2018
|