One feature that has been requested with increasing frequency of late is the ability to log in to Windows laptops over a wireless connection, i.e. without plugging into a network cable the first time. We have been piloting a way to do this with our Circulation loaners and a wireless lab in MBH for several months now with good results.
We will be bringing this feature to standard College-owned Windows 7 laptops starting this Monday, June 6th. [UPDATE: the upgrade was successful.] After the change takes effect, you may notice the words “Windows will try to connect to MiddleburyCollege” underneath the normal login fields. What this means is that Windows will first use the credentials supplied to connect to the wireless network, and if successful, will then authenticate over the network, allowing you to login with your current username and password, whether or not you have used that device previously.
If the wireless connection should fail for some reason, for example because you are too far away from an access point for a good signal, Windows will check for cached credentials from a previous login as normal.
Please e-mail firstname.lastname@example.org with any questions about this change.
Information Technology Services
To help raise awareness about community efforts to prevent significant security issues, Middlebury Information Security has launched a ‘Security Scout of the Month’ award.
Highlighting the valuable contributions of community security scouts in an @MiddInfoSec blog post and on Middlebury’s Information Security web site is a great way to show how a cautious and thoughtful approach to computing can protect the College community from cyber risks. In addition, recipients will receive a twenty-five dollar Amazon gift card.
As an example, this past month, an attack against Middlebury’s Banner system was avoided thanks to the contributions of an astute member of our community, Justin Allen, who spotted a targeted phishing attack and raised the awareness around this malicious event.
As Justin Allen describes it:
“I received an email that started out dear account owner which usually gets my attention and as I read down thru the email I noticed that it said I had signed up for a paperless W-2 which I did not and it wanted me to logon to view it. After that I noticed a couple of another things that did not make sense for my Middlebury account one was the sender of the email which wasn’t from the college at all and we all have been told time and time again if the address doesn’t end with middlebury.edu it’s not from the college. Below is a copy of what was sent to me.”
This astute awareness is why Justin is this month’s ‘Security Scout of the Month’.
We are excited to celebrate the hard work and security conscious efforts of our community. Please watch for the next ‘Security Scout of the Month’ and help us recognize these efforts.
If you would like to recognize an individual for their information security contributions or would like to raise an information security concern, please contact email@example.com.
Middlebury ITS is preparing to introduce a new email security service. Over the next few weeks, ITS will begin routing Middlebury email messages through Microsoft’s email message security service, Exchange Online Protection. Microsoft’s service will perform spam filtering, anti-virus, and other security checks on inbound and outbound Internet email.
The way you ACCESS email WILL NOT need to CHANGE in order for you to benefit from this service. Outlook and Outlook Web Access, for example, will continue to behave just as they always have.
How you ALLOW or BLOCK email from specific senders WILL CHANGE. With Exchange Online Protection, you will be able to manage blocked and allowed senders right from within Outlook and Outlook Web Access, using the Safe Senders and Junk Mail tools. For tips on how to use Safe Senders and Junk Mail, please see the following Microsoft articles:
Middlebury ITS Helpdesk
With an increasing amount of storage space and institutional connectivity on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you protect against and prepare for the potential loss or theft of a laptop or mobile device.
- Don’t leave your device alone, even for a minute. If you’re not using it, lock your device in a cabinet or drawer, use a security cable, or take it with you. Middlebury has seen laptops stolen in the College library and from individual’s cars. Don’t assume your devices are safe because you feel at home with your surroundings.
- Report any lost or stolen device promptly. Both institutional and personal devices may contain Middlebury data. Even if you only lose a personal device, work with the College’s Information Security workgroup to ensure that institutional or sensitive data is accounted for. Information Security may also be able to help you recover the device. If a device is lost or stolen contact the helpdesk at x2200 immediately.
- Do not store extremely sensitive or internal data. Never store protected or sensitive data on your laptop. Refer to the Data Classification policy for clear definitions of data types. (http://go.middlebury.edu/dcp)
- Keep your master and working copy of all data on network storage. Keeping your master and working copies of all of your data on Middlebury Google Drive or other secure network file storage such as Middfiles. This ensures that your data is protected and backed-up if your laptop is stolen or lost. Photos, papers, research, and other files are irreplaceable, and losing them may be worse than losing your device.
- Record the serial number. Keep the serial number and asset tag of your device and store it in a safe place. This information can be useful for verifying your device if it’s found. This is especially important when you travel. Airport and police agencies may ask for this information when reporting lost or stolen devices.
- Enable device tracking and wiping services. Use tracking and recovery software included with most devices (e.g., the “Find iDevice” feature in iOS) Some software includes remote-wipe capabilities. This feature allows you to log on to an online account and delete all of the information on your laptop. Mobile resources can be found here:
- Apple iCloud: http://www.icloud.com
- Microsoft Account: http://account.Microsoft.com/devices
- Android Device Manager: https://support.google.com/accounts/topic/6160499?hl=e
From our Moodle host:
In order to ensure complete patching of OpenSSL the following site will be placed in maintenance mode, then rebooted during the listed maintenance window.
These patches have already been applied to the front end SSL for your site, but the reboot is a requirement for all services to run the fully patched OpenSSL version.
Hosted Site: http://moodle.middlebury.edu
Window: 1:00 AM to 5:00 AM EDT, May 20th, 2016
Please note the time zone specified above.
Has an ebook you’ve previously used disappeared from our catalog? Never fear! We’ve had to make some cutbacks at the end of the fiscal year (lots and lots of requests for new material this year), but if you need to regain access to something that no longer appears, we may be able to get you back in. Just email us the title at firstname.lastname@example.org, and if it’s still available to us, we’ll get you back up and running with it.