Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.
- How to spot a phish
- Safe download practices and installing applications on your computer
- Data classification and sensitive data
- Removable media and when to use it
- Password management and what to do with all of those passwords
Follow ITS-Information Security on Twitter: @MiddInfoSec
Information Security has a New Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec
Planning a spring break vacation? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.
- Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities and also protects against malware.
- Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easy target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
- Traveling soon? If you’re traveling with a laptop or mobile device, remove or encrypt confidential information. Consider using a laptop or device designated for travel with no personal information, especially when traveling out of the country.
- Limit personal information stored on devices. Use a tool like Identity Finder to locate your personally identifiable information (e.g., SSN, credit card numbers, or bank accounts) on your computer, then secure or remove that information.
Physically protect yourself and your devices. Use a laptop lock, avoid carrying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at the ATM.
Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec
You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!
- Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
- Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
- Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
- Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
- Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.
|Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201||January 14, 2016||View & sign-up »|
Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201
Date: January 14, 2016
Are you drowning in journal articles and books, but not sure how to keep track of it all? Are you working on a senior project or need help managing your resources? Let us help you on the next stage of your journey as a power researcher. After this workshop, you’ll be an expert in Zotero, the citation management tool that can help you save, organize, and cite your sources, and you’ll be able to create bibliographies with the click of a button. This workshop will be taught by Middlebury research librarian Stacy Reardon. PLEASE NOTE THE ALTERNATE ROOM.
Current list of Workshops
The Digital Media Bootcamp offers the same workshops that we use in our Digital Media Tutor training during the month of January, and are open, à la carte, to all interested faculty, staff and students. This is the same training that we have been using for the Summer Digital Media Tutor program, plus a few additions based on feedback from last year’s Bootcamp.
The following sessions will introduce the attendees to a wide variety of technologies and uses, including computing practices at Middlebury, concepts and software for developing media, and devices for creating and consuming media. Most sessions will run for 90 minutes and will take place in the Wilson Media Lab in the Davis Family Library.
New This Year
Digital Liberal Arts Data Bootcamp
- Instructors: Ryan Clement, Alicia Peaker, TBA
- Description: Are you new to working with data for digital scholarship? In this DLA sponsored workshop series, we will teach you some of the basics of working with data as well as some free (and mainly web-based) tools you can use to visualize data, map data, and analyze textual data. The series will include one required course on the first day, as well as three à la carte course over the following three days. Attend one, or attend all three! All courses will be 3 hours long and will include discussions of background concepts as well as hands-on work.
Because these courses will be tailored to the participants’ interests and disciplines, the deadline for signing up is January 1st. Please contact Alicia Peaker or Ryan Clement with any questions.
Current Sign-up Sheets
October is Cybersecurity Awareness Month. Join your colleagues from both the Middlebury and Monterey campuses for a presentation and discussion on critical cybersecurity issues including phishing and cracking.
- On October 29th at 12:30 Eastern time, Information Security will host a Cybersecurity Roadshow.
- You can join the discussion in Lib105A on the Middlebury Campus or on PolyCom 710205
- Central Monterey meeting location TBD.
Please join us for this discussion. It is open to students, faculty, staff and the community. Computer security is the responsibility of us all.
For more information call Information Security at 802-349-5805
Our current Learning Management System (LMS), Moodle, was adopted back in 2011. Four years later we are reflecting on whether Moodle is still the best LMS to serve the growing needs of Middlebury. This fall we are doing a pilot to evaluate Canvas and determine whether we want to continue with Moodle or move to Canvas. You can learn more about Canvas and Middlebury’s evaluation by following this site – http://sites.middlebury.edu/canvas/
Since it has launched over 1,200 colleges, universities and school districts have adopted Canvas, including many of our peer and neighboring institutions, including Amherst, Williams, Harvard, Yale, and Dartmouth. It uses modern technology and service management, has a user-centric design, and the features that are common to an LMS are easier to find and use.
Some of the appealing features that are worth exploring are:
- the options for the course homepage
- the calendar works across courses
- the built-in webcasting tool
- the way it treats sections within a course
- the speedgrader workflow
- the course setup checklist
What about Moodle?
Middlebury adopted Moodle as its LMS in 2011 after a year-long evaluation (http://sites.middlebury.edu/segue/2011/06/14/moodle-middlebury/). At that time it was decided that we would use Moodle for a minimum of 5 years. At the end of the 5 years we would ask ourselves: Is Moodle still the right LMS for Middlebury? The 5 years will end in August of 2016.
The Canvas evaluation should not be considered as a sign that Middlebury intends to stop using, supporting, or expanding the platform. This is simply an opportunity to consider other options and review our use of Moodle.
A year ago the Internet saw a rash of malware known as ransomware. This malicious form of cyber attack is known for infecting a computer and encrypting a drive. The victim is then unable to recover their data until paying a ransom to the attacker. Middlebury, like many other institutions was not immune to this form of attack.
A week ago the FBI announced a new variant on a common form of these attacks known as CryptoWall. This form of ransomware is known to have four methods of infecting a computer.
- Phishing: the attacker may lure a victim into downloading an infected attachment through a phishing campaign and thereby compromising the drive on their system.
- Phishing: the attacker lures the victim into clicking on a link to a malicious web site where the victim unknowingly downloads the malicious software onto their system and compromises their drive.
- Infected ad: the attacker posts and infected ad on a website which a user might click thereby causing the download of malicious software.
- Compromised website: the attacker compromises a website so when a user visits the website they unknowingly download malicious software and compromise their system.
According to the FBI, by far the most common method of attack is phishing, particularly with attachments in the message.
What you can do to protect yourself:
- Never open attachments or click links in emails that you do not recognize or trust.
- Know what a phishing attack is and how to spot one. visit http://go.middlebury.edu/phish or http://phishing.org
- If you think you have fallen for a phish change your password. then call x2200
- If you believe you system is compromised, unplug it from the power and the network. Shut it down immediately. Do not worry about saving your work. then call x2200.
- Backup your data routinely. If you save your data to Middfiles or your home directory it will be backed up automatically.
- Never disable your antivirus software.
- Send any suspect emails to email@example.com
- Only download software from known vendor sites.
- Don’t click on ads in web sites. Visit vendor websites directly.