Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.
- How to spot a phish
- Safe download practices and installing applications on your computer
- Data classification and sensitive data
- Removable media and when to use it
- Password management and what to do with all of those passwords
Follow ITS-Information Security on Twitter: @MiddInfoSec
Information Security has a New Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec
Planning a spring break vacation? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.
- Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities and also protects against malware.
- Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easy target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
- Traveling soon? If you’re traveling with a laptop or mobile device, remove or encrypt confidential information. Consider using a laptop or device designated for travel with no personal information, especially when traveling out of the country.
- Limit personal information stored on devices. Use a tool like Identity Finder to locate your personally identifiable information (e.g., SSN, credit card numbers, or bank accounts) on your computer, then secure or remove that information.
Physically protect yourself and your devices. Use a laptop lock, avoid carrying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at the ATM.
Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec
You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!
- Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
- Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
- Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
- Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
- Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.
The Snow Bowl telephone system is out of service until some parts can be replaced – either later this afternoon or tomorrow, January 20. If you need to contact them by phone in the mean time, the back up telephone number is 388-2871.
We’ve added another session to the Digital Media Bootcamp.
Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm
Date: January 18, 2016
Mack Roark – This workshop will teach you the basic functionality of Apple’s Quicktime, how to use SnapZ Pro to do a screen capture of video, and how to use features of MPEG StreamClip to view and convert video clips. Also included is an overview and demonstration of the scanners, plotter, and capture station located in the Wilson Multimedia Development Lab. You will learn the basics of how to operate these devices and the software associated with them. This is a 2 hour workshop.
Current List of Workshops
|Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm||January 18, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Working with Data @1pm until 4pm||January 19, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Visualizing Data @1pm until 4pm||January 20, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Mapping Data @1pm until 4pm||January 21, 2016||View & sign-up »|
|Liberal Arts Data Bootcamp – Analyzing Textual Data @1pm until 4pm||January 22, 2016||View & sign-up »|
|Introduction to Information Literacy @ 2:45pm||January 25, 2016||View & sign-up »|
|Safe Computing Practices at Middlebury @ 1pm||January 25, 2016||View & sign-up »|
|Online Identity: Your Story to the World @ 2:45pm||January 26, 2016||View & sign-up »|
|Online Recording Lab: SANSSpace @ 1pm||January 27, 2016||View & sign-up »|
|Intro to Audio Literacy @ 3:30pm||January 27, 2016||View & sign-up »|
|Intro to Visual Literacy and Presentations @ 3:30pm||February 3, 2016||View & sign-up »|
Virtual reality in 2016: The 10 biggest trends to watch – one point of view on what to expect, and what not to expect, in virtual reality in the coming year.
The 10 most important lessons IT learned in 2015 – Before moving on to the new year it is a good idea to reflect back on lessons learned during the previous 12 months. It is also a good idea to compare our experience to that of others.
|Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201||January 14, 2016||View & sign-up »|
Zotero for Everyone: Organize Your Research @ 4:30pm in LIB 201
Date: January 14, 2016
Are you drowning in journal articles and books, but not sure how to keep track of it all? Are you working on a senior project or need help managing your resources? Let us help you on the next stage of your journey as a power researcher. After this workshop, you’ll be an expert in Zotero, the citation management tool that can help you save, organize, and cite your sources, and you’ll be able to create bibliographies with the click of a button. This workshop will be taught by Middlebury research librarian Stacy Reardon. PLEASE NOTE THE ALTERNATE ROOM.
Current list of Workshops
The Davis Family Library will offer extended hours starting Sunday, December 6th. We will open at 9 am that day and be open 24 hours through Friday, December 11th, when we will close at the regular 11 pm. Saturday, December 12th will be regular hours, 9 am – 11 pm. 24/7 will resume on Sunday starting at 9 am and the library will close at 10 pm on Sunday, December 20th. A Middlebury College ID will be required to enter the library after 11 pm during this period.
Armstrong Library will maintain regular hours, with extended hours on Friday and Saturday, December 18th and 19th.
Full hours can be found at go/hours.