Category Archives: LIS Staff Interest

@MiddInfoSec: Information Security RoadShow: 2/23/2016

Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.

Topics include:

  • How to spot a phish
  • Safe download practices and installing applications on your computer
  • Data classification and sensitive data
  • Removable media and when to use it
  • Password management and what to do with all of those passwords

 

Follow ITS-Information Security on Twitter: @MiddInfoSec

Weekly Web Updates – February 8, 2015

New Features

In collaboration with College Communications, the new site for February Orientation uses a responsive design to make it easy to browse on mobile devices. This is a sub-theme in our main Drupal site, meaning that the same features are available as elsewhere on the site, just presented differently for these sub-pages. The responsive theme works best with content designed to be shown at multiple viewport resolutions, so it’s something we’ll roll out to new portions of the site that have carefully crafted content.

Updates

Tweaks & Fixes

  • We have removed the “Profiles” view from the main Middlebury site. This was used to aggregate profiles from multiple sub-pages, but was difficult to set up and made sorting the profiles a pain. We moved away from this on all academic sites over a year ago, but have finished migrating the other portions of the site that were using this. The documentation on using Profiles on the Middlebury site is now accurate for all instances of this content type.
  • The Group Manager now has a “super admin” role that can modify group membership, allowing us easier management of web permissions groups maintained by people who have since left Middlebury or are otherwise unavailable.
  • Fixed the Group Manager‘s notification system — changes to groups are now reflected in the Drupal sites after approximately 20 seconds rather than waiting until the next full sync.
  • The NextGEN Gallery plugin will, by default, save a backup copy of all the images you upload, more than doubling the disk space used by the plugin. This option will now default to “off” for new sites enabling the plugin. Those desiring it can still enable the option through the “Other Options” screen in the plugin settings.

@MiddInfoSec: Guard Your Privacy When Offline or Traveling

Information Security has a new Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec

Planning a spring break vacation or work-related travel? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.

  • Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities.
  • Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easier target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
  • Traveling soon? If you’re traveling with a laptop or mobile device, make sure it is secured with strong authentication and avoid traveling with (or if you must, encrypt) confidential information.
  • Limit the amount of personal and/or sensitive information stored on your devices. Locate, secure, (or better yet) remove PII (personally identifiable information) such as your SSN, credit card numbers, and/or bank account information, and do not travel with unencrypted confidential Middlebury information on your devices.
  • Physically protect yourself and your devices. Use a laptop lock, avoid unnecessarily displaying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at ATM’s or while using your devices in public places.

These are just some of the many things that you can do to travel more safely! For more information about information security, visit our website at http://go.middlebury.edu/infosec.

Much of this content comes from the Awareness and Training Working Group of the EDUCAUSE Higher Education Information Security Council (HEISC) and is then tailored for the Middlebury community.

#Phishing: Beware new phishing email

Beware new phishing email with subject line “RE: Faculty and Staff Notice”. Don’t click link to “IT ADMINISTRATOR SERVICE”

Image 001

For more information on phishing please visit http://go.middlebury.edu/phish

Please submit and suspicious emails or phishing attempts to phishing@middlebury.edu.

 

Weekly Web Updates – February 1, 2016

New Features

When sharing News stories from the Middlebury site on Facebook, the top right image will always be the default image for the post. You can change this to a different image by editing the “og:image” field in the Meta Tags section. See our documentation on meta tags. Choosing these defaults for other content types is something we’ll be working on in the future and your suggestions are welcome.

The Enable Media Replace plugin is now available for WordPress. With this, you can replace an old file with a newer version of the file. This is particularly useful if you have a PDF or Word document that you need to replace with an updated copy. The replacement is done in a way that preserves all the existing links to the file.

We have added support for Emma email marketing signup forms in WordPress.

Updates

Canvas Adoption Proposal

Below is the official proposal for the adoption of Canvas, crafted and submitted by the Curricular Technology Team. Many faculty, students and staff contributed to the pilot that informed the proposal, we sincerely appreciate everyone’s efforts. There are a couple of notes about the proposal: The proposal assumes that the Canvas budget request will still...

[Continue reading]

Flow has a new name

Attention, researchers: If you used Summon or another library database to save citations to a Flow account, please be aware that Flow is now called RefWorks 3. It also has new tools and capabilities. If you were a Flow user, simply log in to the new RefWorks with your Flow username and password in order to access, add to and manage your citations.

You may log in to the new RefWorks by using this link (RefWorks 3 login) or by clicking on the “RefWorks Log In” link at the top of the results page in Summon:

RefWorks login in Summon

We will update library guides for RefWorks 3 and Flow soon. For now, please visit RefWorks 3 Help for additional documentation.

Researchers who have been using legacy RefWorks should continue to use it. Be aware that clicking on “RefWorks” links in Summon will bring you to a page that invites you to create an account with RefWorks 3, and RefWorks 3 will not automatically contain your citations from legacy RefWorks. We will share more advice as it becomes available.

Protect Your Privacy

Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec

You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!

  • Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
  • Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
  • Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
  • Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
  • Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.