Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.
- How to spot a phish
- Safe download practices and installing applications on your computer
- Data classification and sensitive data
- Removable media and when to use it
- Password management and what to do with all of those passwords
Follow ITS-Information Security on Twitter: @MiddInfoSec
Information Security has a new Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec
Planning a spring break vacation or work-related travel? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.
- Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities.
- Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easier target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
- Traveling soon? If you’re traveling with a laptop or mobile device, make sure it is secured with strong authentication and avoid traveling with (or if you must, encrypt) confidential information.
- Limit the amount of personal and/or sensitive information stored on your devices. Locate, secure, (or better yet) remove PII (personally identifiable information) such as your SSN, credit card numbers, and/or bank account information, and do not travel with unencrypted confidential Middlebury information on your devices.
- Physically protect yourself and your devices. Use a laptop lock, avoid unnecessarily displaying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at ATM’s or while using your devices in public places.
These are just some of the many things that you can do to travel more safely! For more information about information security, visit our website at http://go.middlebury.edu/infosec.
Much of this content comes from the Awareness and Training Working Group of the EDUCAUSE Higher Education Information Security Council (HEISC) and is then tailored for the Middlebury community.
Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec
You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!
- Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
- Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
- Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
- Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
- Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.
Telephone service at the Snow Bowl was restored last evening, 1/19/16. 802-443-SNOW (7669)
The Snow Bowl telephone system is out of service until some parts can be replaced – either later this afternoon or tomorrow, January 20. If you need to contact them by phone in the mean time, the back up telephone number is 388-2871.
We’ve added another session to the Digital Media Bootcamp.
Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm
Date: January 18, 2016
Mack Roark – This workshop will teach you the basic functionality of Apple’s Quicktime, how to use SnapZ Pro to do a screen capture of video, and how to use features of MPEG StreamClip to view and convert video clips. Also included is an overview and demonstration of the scanners, plotter, and capture station located in the Wilson Multimedia Development Lab. You will learn the basics of how to operate these devices and the software associated with them. This is a 2 hour workshop.
Current List of Workshops
|Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm||January 18, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Working with Data @1pm until 4pm||January 19, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Visualizing Data @1pm until 4pm||January 20, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Mapping Data @1pm until 4pm||January 21, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Analyzing Textual Data @1pm until 4pm||January 22, 2016||View & sign-up »|
|Introduction to Information Literacy @ 2:45pm||January 25, 2016||View & sign-up »|
|Safe Computing Practices at Middlebury @ 1pm||January 25, 2016||View & sign-up »|
|Online Identity: Your Story to the World @ 2:45pm||January 26, 2016||View & sign-up »|
|Online Recording Lab: SANSSpace @ 1pm||January 27, 2016||View & sign-up »|
|Intro to Audio Literacy @ 3:30pm||January 27, 2016||View & sign-up »|
|Intro to Visual Literacy and Presentations @ 3:30pm||February 3, 2016||View & sign-up »|
Virtual reality in 2016: The 10 biggest trends to watch – one point of view on what to expect, and what not to expect, in virtual reality in the coming year.
The 10 most important lessons IT learned in 2015 – Before moving on to the new year it is a good idea to reflect back on lessons learned during the previous 12 months. It is also a good idea to compare our experience to that of others.