Plan ahead for a lunch and learn RoadShow. On February 23rd, 2016 ITS-Information Security will be hosting a RoadShow conversation on safe computing practices and phishing avoidance techniques in Lib145 from 12:00 to 1:00. This conversation is open to the entire Middlebury community. All are encouraged to come.
- How to spot a phish
- Safe download practices and installing applications on your computer
- Data classification and sensitive data
- Removable media and when to use it
- Password management and what to do with all of those passwords
Follow ITS-Information Security on Twitter: @MiddInfoSec
In collaboration with College Communications, the new site for February Orientation uses a responsive design to make it easy to browse on mobile devices. This is a sub-theme in our main Drupal site, meaning that the same features are available as elsewhere on the site, just presented differently for these sub-pages. The responsive theme works best with content designed to be shown at multiple viewport resolutions, so it’s something we’ll roll out to new portions of the site that have carefully crafted content.
Tweaks & Fixes
- We have removed the “Profiles” view from the main Middlebury site. This was used to aggregate profiles from multiple sub-pages, but was difficult to set up and made sorting the profiles a pain. We moved away from this on all academic sites over a year ago, but have finished migrating the other portions of the site that were using this. The documentation on using Profiles on the Middlebury site is now accurate for all instances of this content type.
- The Group Manager now has a “super admin” role that can modify group membership, allowing us easier management of web permissions groups maintained by people who have since left Middlebury or are otherwise unavailable.
- Fixed the Group Manager‘s notification system — changes to groups are now reflected in the Drupal sites after approximately 20 seconds rather than waiting until the next full sync.
- The NextGEN Gallery plugin will, by default, save a backup copy of all the images you upload, more than doubling the disk space used by the plugin. This option will now default to “off” for new sites enabling the plugin. Those desiring it can still enable the option through the “Other Options” screen in the plugin settings.
Information Security has a New Twitter feed and other new content on their website. Follow us at @MiddInfosec or visit our website at http://go.middlebury.edu/infosec
Planning a spring break vacation? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.
- Track that device! Install a device finder or manager on your mobile device in case it’s lost or stolen. Make sure it has remote wipe capabilities and also protects against malware.
- Avoid social media announcements about your travel plans. It’s tempting to share your upcoming vacation plans with family and friends, but consider how this might make you an easy target for local or online thieves. While traveling, avoid using social media to “check in” to airports and consider posting those beautiful photos after you return home. Find out how burglars are using your vacation posts to target you in this infographic.
- Traveling soon? If you’re traveling with a laptop or mobile device, remove or encrypt confidential information. Consider using a laptop or device designated for travel with no personal information, especially when traveling out of the country.
- Limit personal information stored on devices. Use a tool like Identity Finder to locate your personally identifiable information (e.g., SSN, credit card numbers, or bank accounts) on your computer, then secure or remove that information.
Physically protect yourself and your devices. Use a laptop lock, avoid carrying identification cards, shred sensitive paperwork before you recycle it, and watch out for “shoulder surfers” at the ATM.
Beware new phishing email with subject line “RE: Faculty and Staff Notice”. Don’t click link to “IT ADMINISTRATOR SERVICE”
For more information on phishing please visit http://go.middlebury.edu/phish
Please submit and suspicious emails or phishing attempts to firstname.lastname@example.org.
When sharing News stories from the Middlebury site on Facebook, the top right image will always be the default image for the post. You can change this to a different image by editing the “og:image” field in the Meta Tags section. See our documentation on meta tags. Choosing these defaults for other content types is something we’ll be working on in the future and your suggestions are welcome.
The Enable Media Replace plugin is now available for WordPress. With this, you can replace an old file with a newer version of the file. This is particularly useful if you have a PDF or Word document that you need to replace with an updated copy. The replacement is done in a way that preserves all the existing links to the file.
We have added support for Emma email marketing signup forms in WordPress.
Attention, researchers: If you used Summon or another library database to save citations to a Flow account, please be aware that Flow is now called RefWorks 3. It also has new tools and capabilities. If you were a Flow user, simply log in to the new RefWorks with your Flow username and password in order to access, add to and manage your citations.
You may log in to the new RefWorks by using this link (RefWorks 3 login) or by clicking on the “RefWorks Log In” link at the top of the results page in Summon:
We will update library guides for RefWorks 3 and Flow soon. For now, please visit RefWorks 3 Help for additional advice. Researchers who are using legacy RefWorks currently do not need to make any changes.
Information Security has a New Twitter feed and other new content on their website. Follow us at #MiddInfosec or visit our website at http://go.middlebury.edu/infosec
You and your information are everywhere. When you’re online you leave a trail of “digital exhaust” in the form of cookies, GPS data, social network posts, and e-mail exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!
- Use long and complex passwords or passphrases. These are often the first line of defense in protecting an online account. The length and complexity of your passwords can provide an extra level of protection for your personal information.
- Take care what you share. Periodically check the privacy settings for your social networking apps to ensure that they are set to share only what you want, with whom you intend. Be very careful about putting personal information online. What goes on the Internet¬¬ usually stays on the Internet.
- Go stealth when browsing. Your browser can store quite a bit of information about your online activities, including cookies, cached pages, and history. To ensure the privacy of personal information online, limit access by going “incognito” and using the browser’s private mode.
- Using Wi-Fi? If only public Wi-Fi is available, restrict your activity to simple searches (no banking!) or use a VPN (virtual private network). The latter provides an encrypted tunnel between you and the sites you visit.
- Should you trust that app? Only use apps from reputable sources. Check out reviews from users or other trusted sources before downloading anything that is unfamiliar.