ICTS will be running limited services on Friday, 23 November 2018 from 10:00 a.m. onwards. This is due to ICTS staff attending a function off campus.
The IT Helpdesk and Classroom Support Services Helpdesk will remain open on skeleton staff. The ICTS Front Office will close at 10:00 a.m. on the day.
Should you require IT assistance during this time, you can log a call using one of the following methods:
Each month, ICTS performs critical maintenance to help ICT components and subsystems operate effectively and reliably. The work is done during our scheduled maintenance slots, which are explained in this article.
November slot extended
The upcoming slot on Sunday, 18th November 2018, has been extended to accommodate critical work needed as part of the UCT Network Renewal Project. The slot will run from 8:00 a.m. until 10:00 p.m.
Unless advised to the contrary, do not expect any ICT services to be available for the duration of the maintenance slot.
Plan your conferences and teaching around the schedule
Please remember to consult the Scheduled ICTS Maintenance slots for 2018 before planning any teaching, conferences, meetings, etc. that require ICT services.
For more information, see our article on why ICTS schedules regular monthly maintenance slots.
We are aware of an intermittent problem affecting the ICTS Downloads page. Some UCT staff and students are unable to access this page at certain times.
ICTS technicians are currently working to resolve the problem as soon as possible.
Should you experience a problem accessing ICTS Downloads, please log a call with the IT Helpdesk using one of the following methods:
ICTS engineers need to perform maintenance on the UCT telephony system this evening (Wednesday 24th October) from 8:00 p.m. until 11:00 p.m.
During this time, you may experience intermittent interruptions to phone calls – whether you’re using Skype for Business or your Polycom handset.
We are aware of a new phishing attack currently doing the rounds on campus. This attack, which contains a malicious link, specifically targets UCT staff and student email accounts.
The message claims that your account access has been indefinitely revoked, and asks you to click on a link to verify and reactivate your account.
What do I do?
- DO NOT CLICK THE LINK IN THE EMAIL.
- If you did click the attachment in the email, DO NOT enter your details on the page. Instead, please close the page and run a full antivirus scan of your machine. Then, on a device that you know to be free of malware and infection, change your password.
What happens if I clicked the attachment and entered my details?
If you've entered your details, your account may be compromised. This puts the UCT network and UCT assets at risk. Please:
- On a device that you know to be free of malware and infection, change your password.
- Send an email to the IT Helpdesk informing them that your details were compromised, but that you have changed your password.
- Run a full antivirus scan on the machine you used to enter your details.
- Don't ever reply to emails that request personal information – especially usernames and passwords.
- NEVER share your password with anyone – not even an ICTS representative.
- Do not open attachments unless you can verify the sender and the nature of the attachment.
- Don't open emails of unknown origin.
- Don't click on links in emails if you cannot recognise where the link directs you.
- Don't reply to spammers asking them to remove you from their mailing list. Replying just confirms your email address as valid, which encourages them to send you more spam.
- Don't forward chain letters or marketing material.
- Report any incidence of this or phishing attacks to the UCT CSIRT at email@example.com. You can also report any other cybersecurity issues to the same address.
ICTS has resolved the issue affecting the UCT telephony service. The system is now stable, but we will continue to monitor the situation.
Previous message posted Tuesday 9th October, 4.12 p.m.
ICTS is aware of an issue which caused brief interruptions to the UCT telephony service today (9th October). Certain phones, as well as the Skype for Business client, lost connection to the server for a few minutes. We are currently investigating the issue.
ICTS has resolved the problem affecting the UCT Third Party System. The system has been restored and is once again available.
We will continue to monitor the situation.
Previous message posted 10:07 a.m. on 1st October 2018:
ICTS is aware of a problem affecting the UCT Third Party System, which is currently unavailable.
Our engineers are investigating the cause of the problem.
Apple has released macOS Mojave 10.14, the latest version of its operating system (OS) for Mac computers. This update introduces full Dark Mode, new apps and an all new Mac App Store.
View the Apple Mac website for the latest features available in this macOS.
Do not install Mojave just yet
ICTS is currently testing Mojave to ensure that it does not conflict with existing software and systems already in use on campus.
We therefore advise that you do not install Mojave until we give the go ahead, as we are unable to support this macOS until our testing is completed.
Once our testing is finalised, we will notify you and you can then install the update to Mojave via the App store.
ICTS is currently aware of a problem affecting our IT infrastructure. Our engineers need to perform emergency maintenance today (Monday, 17 September 2018) from 12:00 p.m. to 2:00 p.m. to address this issue.
Some ICT services may be affected during this time.
We thank you for your patience as we conduct this necessary maintenance.
ICTS engineers have identified the root cause of the problem affecting the voice quality of some calls made via Skype for Business. They’ve made the necessary changes to resolve the issue.
Our engineers will continue to monitor the situation.
Previous message sent Monday, 03 September 2018
ICTS engineers are currently investigating a problem affecting the voice quality of some calls made via the Skype for Business unified communication platform.
We are working together with our vendor to address this issue.