The ILLiad web pages will be down from 9:00 am today while we upgrade the ILLiad software to v8.7. The ILL web site will be inaccessible for only a short time, assuming all goes well with the update. If anyone has problems after 2:00 pm please contact Rachel Manning at x5498 or firstname.lastname@example.org for assistance.
It is important for each of us to be aware of the increasing security risks to our increasingly connected lives. From laptops and tablets to smartphones and wearable technology, and 24/7 access to our personal data, the risk of sensitive information being exposed is very real.
- Be Data Aware:
Travel with, save, or record ONLY the data that is necessary and essential. Always redact or remove unnecessary sensitive data. Always keep your data backed-up and encrypted, when possible.
- Protect Your Device:
Add a passcode to your cell phone, tablet, or laptop right now! iOS devices automatically encrypt your data once a passcode has been set. Android devices can encrypt your data with a few minor settings changes.
- Use Strong & Unique Passwords or Passphrases:
Especially for online banking and other important accounts.
- Use Multi-Factor Authentication when available:
Middlebury is introducing MFA for O365 and other services in 2016. Use MFA wherever possible.
- Check Your Social Media Settings:
Review your social media security and privacy settings frequently. Enable MFA whenever possible. Keep your social media accounts current or close them.
- Educate Yourself:
Stay informed about the latest technology trends and security issues such as malware and phishing. Visit http://go.middlebury.edu/infosec for more information. For targeted training visit: http://go.middlebury.edu/infoseced .
- Get Trained:
Contact ITS – Information Security at email@example.com to set up a training session for your department.
Through mid-August, our Middlebury and Monterey campuses have trial access to this database from Al-Manhal, the only provider of full-text searchable databases of scholarly and scientific publications from the Arab and Islamic world. Al-Manhal’s over 13,000 e-books and 300 peer-reviewed journals can be searched through the user-friendly platform linked above. The full-text content is also fully indexed in Summon. (Allow a few days after this post for all Al-Manhal content to be find-able in Summon by Middlebury and MIIS users.)
The ILLiad Web pages will be down at 10:00 am today while we upgrade the ILLiad software. The ILL web site should be inaccessible for only a short time, assuming all goes well with the update.
If anyone has problems after 2:00 pm please contact Rachel Manning at x5498 or firstname.lastname@example.org for assistance.
You may know that Middlebury uses what’s called a “purchase on demand” model for its largest collection of electronic books, EBL (Electronic Book Library). Under this model, we place the catalog records in Midcat but don’t pay anything for the ebook unless and until it’s actually used. Then, we pay a fraction of the list price for each of the first four uses, and on the fifth request, the title is automatically purchased. We have set up seamless access so there’s no delay when you want to use a title, but the library is billed for all uses longer than five minutes, downloads, copies, or printing. There’s a lot more to how the program works, but that’s the broad outline.
Unfortunately, the library has reached the end of its funding for this fiscal year, so we have had to suspend access to the resource until July 1. This is definitely a temporary suspension, and EBL will be back on July 1, along with any titles you may have used but can no longer reach. We’re very sorry for the inconvenience and hope it doesn’t put a serious crimp in your work. Please feel free to contact Douglas Black, Head of Collections Management, for more information.
Has an ebook you’ve previously used disappeared from our catalog? Never fear! We’ve had to make some cutbacks at the end of the fiscal year (lots and lots of requests for new material this year), but if you need to regain access to something that no longer appears, we may be able to get you back in. Just email us the title at email@example.com, and if it’s still available to us, we’ll get you back up and running with it.
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to firstname.lastname@example.org.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to email@example.com or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.