Students, faculty, and staff at Middlebury now have access to over 140,000 e-books on the EBSCO e-book platform.
Ranging from history, religion, and the sciences to poetry, languages, and the arts, these books are available from on-campus or off-campus to multiple simultaneous users.
Over the next few days, these books will become discoverable in Summon, and can be found in Midcat in a few weeks. Let us know what you think – contact your liaison or firstname.lastname@example.org
The upgrade is now complete.
The ILLiad web pages will be down from 9:00 am today while we upgrade the ILLiad software to v8.7. The ILL web site will be inaccessible for only a short time, assuming all goes well with the update.
If anyone has problems after 2:00 pm, please contact Rachel Manning at x5498 or email@example.com for assistance.
It is important for each of us to be aware of the increasing security risks to our increasingly connected lives. From laptops and tablets to smartphones and wearable technology, and 24/7 access to our personal data, the risk of sensitive information being exposed is very real.
Travel with, save, or record ONLY the data that is necessary and essential. Always redact or remove unnecessary sensitive data. Always keep your data backed-up and encrypted, when possible.
Add a passcode to your cell phone, tablet, or laptop right now! iOS devices automatically encrypt your data once a passcode has been set. Android devices can encrypt your data with a few minor settings changes.
- Use Strong & Unique Passwords or Passphrases:
Especially for online banking and other important accounts.
- Use Multi-Factor Authentication when available:
Middlebury is introducing MFA for O365 and other services in 2016. Use MFA wherever possible.
- Check Your Social Media Settings:
Review your social media security and privacy settings frequently. Enable MFA whenever possible. Keep your social media accounts current or close them.
Stay informed about the latest technology trends and security issues such as malware and phishing. Visit http://go.middlebury.edu/infosec for more information. For targeted training visit: http://go.middlebury.edu/infoseced .
Contact ITS – Information Security at firstname.lastname@example.org to set up a training session for your department.
Did you know that most passwords are easily broken? A few “secrets” can help you make a stronger more memorable password.
- Longer is better – use at least 8 characters with upper and lower case, numbers and symbols.
- Create an easy-to-remember passphrase with four or more words substituting special characters for some of the letters.
- Use a unique password for each service or account.
- Change your password or passphrase regularly:
- Be sure you’re on the correct website before entering your password or passphrase
- Set a password for access to your mobile device
- Don’t include personal information such as usernames, account numbers, address or phone numbers in your password or passphrase.
- Don’t reuse the same password for multiple services
- Don’t use a single word, in any language
- Don’t use consecutive repeating characters or a number sequence
- Don’t share your password or passphrase – even with managers, co-workers or the Help Desk
- Don’t send your passwords through email
- Consider using a password safe or password manager such as LastPass, 1Password or Password Safe
- Visit http://go.middlebury.edu/password to reset your network password
- Configure passwords on all of your mobile devices
- Why never to provide your passwords through an email: http://www.phishing.org/
Through mid-August, our Middlebury and Monterey campuses have trial access to this database from Al-Manhal, the only provider of full-text searchable databases of scholarly and scientific publications from the Arab and Islamic world. Al-Manhal’s over 13,000 e-books and 300 peer-reviewed journals can be searched through the user-friendly platform linked above. The full-text content is also fully indexed in Summon. (Allow a few days after this post for all Al-Manhal content to be find-able in Summon by Middlebury and MIIS users.)
Let us know what you think – email email@example.com or your liaison.
The ILLiad Web pages will be down at 10:00 am today while we upgrade the ILLiad software. The ILL web site should be inaccessible for only a short time, assuming all goes well with the update.
If anyone has problems after 2:00 pm please contact Rachel Manning at x5498 or firstname.lastname@example.org for assistance.
Has an ebook you’ve previously used disappeared from our catalog? Never fear! We’ve had to make some cutbacks at the end of the fiscal year (lots and lots of requests for new material this year), but if you need to regain access to something that no longer appears, we may be able to get you back in. Just email us the title at email@example.com, and if it’s still available to us, we’ll get you back up and running with it.
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to firstname.lastname@example.org.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to email@example.com or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.