Tag Archives: Middlebury Community Interest

Notes for Kick-Off on April 5, 2016

Agenda

We will be starting the new ACTT process with a Kick-Off meeting. This is an open, non-mandatory meeting for anyone who is interested in learning about the Academic Cyberinfrastructure Transformation Team to attend. We will introduce the new team members, structure, and thoughts on how the Team activities will be evaluated.

This is an open meeting, please share with anyone who is interested in learning about the ACTT

Notes

  • Mission: “Our mission is to evaluate and recommend technology services and innovations for teach, learning and research.”
  • Joe is teaching a course on “Design Thinking” this semester. Design Thinking includes an “Empathy Phase”

Q&A

    • Q (Melissa/CNS). How will information and requests trickle up?
      • “I have many day-to-day projects where I would love to have a license that exists on the Midd campus, but not the MIIS campus, or I would like to build a server with 1TB of storage to host a web site”
      • “My research center, CNS, is becoming such a large consumer of storage and bandwidth”
      • “On a request from Laurie Patton, I am researching a cloud services that could host our information”.
      • Answer – Joe – Anyone who wants to make a request for technology or technology services for academic use may approach the team. Happy to be an entry point for requests that may go to ITS or other groups.
      • Jim – we have to account for the resource requests during the budget request process.
    • Q (Melissa/CNS). We are a collection of researchers that become PI on large grants, we need to inform others of the implications on the projects that we are running…  So we can write it into
      • We are giving money to non-Middlebury developers to do things that could be done inside Middlebury
      • Jim: not necessarily opposed to using outside resources…
    • Q (Jim): May be Amy McGill can weigh in on the MIIS budget process and how funding decisions are made.
      • Amy McGill
        • MIIS Research Centers are funded with base productivity requirements
        • Campus community infrastructure is for day-to-day use
        • Research Centers seek their own funding for larger projects that need additional resources, they do typically provide for initial as well as on-going maintenance costs.
    • Q. ACTT contribution to the Strategic Planning Process?
      • t.b.d.
  • Q (Melissa/CNS).  Is it too early to start making suggestions for agenda items?
  • Q (Melissa/CNS).  I would love to explore the ability to share licenses across campuses.  We pay out of grant licenses for Tableau, for image processing software…  I drool over some of the licenses that the Geology department has.  This is not a simple request, but I would love to tackle it as a subject.
    • A (Zach/ITS-SR): Let’s talk; more productive if we can get an idea of the specific titles you’re interested in, so we can check what licensing models are available.
  • Q (Melissa/CNS).  I would love to talk about our data storage and access to bandwidth.  Because we use satellite images, large data sets, we are becoming something of a hog on the MIIS systems.   I would like to open a discussion on how we can meet CNS’s research technology needs including storage, bandwidth, and some security issues.
    • Joe: Has anyone done a “needs assessment for the department”?
      • We don’t have a department, we are a research center within a larger campus.
      • I have done a casual needs assessment. 13 TB of storage, external drives, google drives, drop boxes… Need access across three offices.
      • Jim:  ITS can help with a needs assessment and identify appropriate technology solutions, perhaps on campus or in the cloud, ideally consistent with other larger IT initiatives for Middlebury and work with CSN to identify, implement solutions.  We did this for the Middlebury DC office a couple of years ago that included the CSN operation there for example.
  • Q (Bob/MIIS).  Working toward equitable cyber infrastructure across VT and Monterey campuses seems like a an appropriate activity for the Team.

Actions

Joe to build form for collecting evaluation requests.

ACTT In-Progress Project Presentations for RStudio Server and the Academic Cyberinfrastructure Inventory

Tuesday, April 12th from 3-4pm
LIB 105A or Polycom 712833

The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.

Agenda

In this meeting we will have two presentations:

In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.

 

Welcome to “Self-Service” Software Installation

ITS has been working on options for our customers to install licensed software on their college-owned computers using convenient, “self-service” methods that provide control over when the installations take place. (We are not licensed to provide software on personally owned computers, only college owned.)  To learn how this works on college Windows computers, please visit  KACE Self-Service information.  If you have a college Mac, visit Mac Self Service information for details.

Initially, we have made a few of our most commonly-requested Adobe products available through self-service for both Mac and Windows platforms, as well as the new Microsoft Office 2016.   We will be working to add software titles in the next few months.  Please note that not all software is purchased with licensing to be available for every computer on campus.

Self-service installations work best when you are here on campus using a wired (Ethernet) connection to our network.  Use of VPN or wireless connections may work but they will be much slower and are more likely to experience issues.

We are excited to offer this new service and want to hear about how it worked for you.  Feel free to share your feedback, questions, or concerns with our Technology Helpdesk.

@MiddInfoSec: Phishing Alert – – “Update Announcements”

A phishing email message was sent to @middlebury.edu mailboxes today with a subject line of “Update Announcements”.  DO NOT RESPOND ON THIS MESSAGE!

The phishing email message is an attack designed to trick people into disclosing their username and password.  Do NOT follow the instructions in the message, as it could lead to your Middlebury account being compromised.

If you were tricked by the email and responded,  reset your network password immediately at go/password and then call the Helpdesk at x2200 for further assistance with your account and any possible concerns with your computer.

Here’s a sample of the phishing email message:


Dear middlebury.edu User.

Urgent Update Announcements.

Your middlebury.edu Account has been Sign in with a strange IP Address: And this indicate your mail account is been used for FRAUDULENT ACT, For these reasons, Our records indicate you are no longer our current/active user. Therefore, your account has been scheduled for deletion on this Month of APRIL, 2016. As part of this process, your account, files, email address messages etc, will be deleted from our Data Base.

To Retail Your Account.

You are required to reply with your valid ONLINE ACCESS for reactivation, to ensure Your account remains active and subscribed, Otherwise this account will be De-activated within the next 72 hours hence from now.

Name In Full:

User Name:

Pass Word:

@middlebury.edu

Thank You.



 

Come Secure your Mobile Device

Learn about Mobile Security

Plan ahead for an afternoon RoadShow with Information Security March 30th @ 2:00 in Lib145.

This is an opportunity for you to ask questions and converse on topics such as:

  • How do I add a pin to my mobile device
  • Is my device encrypted
  • How do I track my device if lost
  • How do I remote wipe my device
  • How do I ensure my data is backed up

Image 001

Get help securing your mobile device.

Join Information Security in Lib145 @ 2:00PM on March 30th.

Follow Information Security on Twitter @MiddInfoSec.

@MiddInfoSec: MacKeeper AdWare – Do Not Install

Several members of our community have recently reported being prompted to install MacKeeper on their Apple computers running Mac OS X. MacKeeper is malicious software of the adware variety. While MacKeeper offers legitimate services for a fee, it also opens security holes in your system that can introduce other forms of malware and adware which cause problems for your web browser and OS X operating system, such as performance or integrity issues. Do Not install MacKeeper!

MacKeeper is offered by the company Kromtech (formerly ZeoBIT) and has been identified in issues such as fraudulent installs masquerading as other anti-virus applications such as ClamXav. MacKeeper is also known for predacious distribution practices employing other adware to market and distribute their product through pop-up ads. It has also been used to distribute other malware exploits such as OS X/Agent-ANTU as reported by researchers at BAE and Sophos.

If you suspect that you may have installed MacKeeper please contact the Help Desk at x2200 for help removing this software.

@MiddInfoSec: Securing Mobile Devices

Information Security has a new Twitter feed and other new content on their website. Follow us at @MiddInfosec on Twitter or visit our website at http://go.middlebury.edu/infosec

Mobile devices have become one of the primary ways that we communicate and interact with each other. Powerful computers now fit in our pockets and on our wrists, allowing us to bank, shop, view our medical history, work remotely, and communicate from virtually anywhere. With all this convenience comes added risk, so here are some tips to help secure your devices and protect your personal information.

    • Password-protect your devices. Protect the data on your mobile device and enable encryption by enabling passwords, PINs, fingerprint scans, or other forms of authentication. On most current mobile operating systems you have the option to encrypt your data when you have a password turned on. Turn it on!
    • Secure those devices and backup data. Make sure that you can remotely lock and/or wipe each mobile device. That also means you should back up your data on each device in case you need to use the remote wipe function. Services such as iCloud, OneDrive, and Google offer device location, wipe and backup services.
    • Verify app permissions. Don’t forget to review which privacy-related permissions each application is requesting, before installing it. Be cautious of fake applications masquerading as legitimate programs by verifying that the application is from a reputable source, such as the Apple Apps Store, Microsoft’s Store, or Google’s Play Store. Occasionally,  applications in the official stores can include malware. Read reviews and descriptions carefully. Only install applications that you need. Remove applications that you are no longer using.
    • Update operating systems. Security fixes or patches for mobile devices’ operating systems are often included in these updates. Just like patching a computer, iOS, Android, and Windows Mobile all need to be patched and kept current.
    • Be cautious of public Wi-Fi hotspots. When using your mobile device, watch for connections to public hotspots. Many mobile devices will automatically connect to hotspots and prioritize data transmission over Wi-Fi by default. Verify that your settings require manually selecting hotspots if possible. Working with sensitive data while connected to a public hotspot could lead to unintended data exposure. Always ensure that you are using a secure connection.
    • Always apply safe computing practices. Whether traveling with a mobile device, a laptop, or sitting in a hotel business center, you always want to use safe computing practices to protect your data. See this link for more tips: http://www.middlebury.edu/offices/technology/infosec/education/training/SafeComputing.