I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads.
24 February 2014, Security Awareness Panel, Upstate New York College Collaboration Information Technology Summit , Roberts Wesleyan College, 1200 Jefferson Road, Rochester, NY
23 March 2014, Empowering the Introvert Within: Becoming an Outstanding Leader, Mid Atlantic Technical Communication Conference, Philly Metro Chapter STC, Giant Conference Center, Willow Grove, PA
13 April 2014, Spectrum Leadership Day, STC Rochester, Rochester Institute of Technology, Rochester, NY
14 April 2014, A Techcomm Bestiary, Lightning Talk, Spectrum, STC Rochester, Rochester Institute of Technology, Rochester, NY
18 May 2014, Leadership Program, Society for Technical Communication Summit 2014, Phoenix, AZ
19 May 2014, A Techcomm Bestiary, Lightning Talk, Society for Technical Communication Summit 2014, Phoenix, AZ
I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful.
As we head towards our holiday break, remember that there are many scammers trying to trick you into revealing credit card numbers and other Private information–information that can be used for Identity Theft. As part of their attempts, we’re seeing an increase in phishing attempts–some disguised as delivery confirmations.
Follow these guidelines to help ensure your Private information (and your money) stays secure on the Internet.
Use a Secure Computer
- Make sure your computer meets the RIT Desktop and Portable Computer Standard before going online.
- Don’t use public computers to send private information over the Internet.
Use Strong Passwords
- Use a strong, unique password or passphrase where allowed. See our How to Create a Strong Password brochure for tips on choosing strong passwords.
- Take advantage of any additional security features offered by your bank.
Be alert for phishing and scams
- Never respond to an e-mail requesting that you reply with your login information. Scammers go to great lengths to make e-mails appear genuine, but no legitimate bank or retailer will ever ask you to submit private information by e-mail.
- Never give out a bank account number to anyone, and be wary of anyone who insists upon cash or wire transfer only.
Research the Company and Website
- Investigate any retailer you are considering using. How trustworthy are they?
- Check for negative reviews using a search engine.
- If you’re shopping at an auction site, check out the seller’s feedback.
Make Sure the Website Uses Encryption
- The address bar should begin with https (not just “http”) and there must be a padlock in your web browser (the location varies by browser, it usually appears in the address bar or the status bar at the bottom).
Monitor Your Accounts
- Keep track of all your purchases and account history from start to finish and beyond.
- Save copies of your orders and receipts, as well as e-mail confirmations and product descriptions.
- Follow up on your purchases by monitoring your bank account and credit card statements for any unauthorized transactions.
- You may also want to check your credit report annually (check for free at www.annualcreditreport.com).
Problems and Complaints
- If you think you have been a victim of identity theft, take action immediately.Contact your card issuer and follow their instructions.
- New York State Identity Theft – ID Theft Kit http://www.ag.ny.gov/sites/default/files/pdfs/publications/ID_Theft_Kit_2011.pdf
- Federal Trade Commission – Recover From Identity Theft http://www.consumer.ftc.gov/features/feature-0014-identity-theft
Online Shopping Complaints
- If you think you have been a victim of online shopping fraud and/or cannot resolve a problem with the seller, contact the following agencies:
- NYS Attorney General’s Office Consumer Complaint Form http://www.ag.ny.gov/internet-bureau-online-complaint-form?a=CF
- Better Business Bureau https://odr.bbb.org/odrweb/public/GetStarted.aspx
- Online Shopping Tips
- Phishing Tips
Have a good (safe) holiday!
I’m developing a new lightning talk using the concept of a medieval bestiary.
A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter.
This Lightning Talk will provide a bestiary of techcomm practitioners, many of which you WILL encounter in the course of your career. Join me for an enjoyable look at today’s techcomm beasts.
Attendees will enjoy seeing to which beasts they and their colleagues are most similar. Note that any resemblance to actual techcomm practitioners is purely coincidental. No actual techcomm practitioners will be harmed in the production of this lightning talk.
I’m planning on tieing medieval images to techcomm careers and/or individuals. What do you all think about that?
I’ll be presenting this Lightning Talk at the STC Summit 14 in Phoenix in May.
Are there any areas you would add? For me, information security fits into both domain expertise and risk management.
The Society for Technical Communication provides a great place to learn about techcomm and develop the networking connections to take you along your career path. If you’re interested in techcomm, check us out.
Guest post from Hannah Morgan. This post will also appear on careersherpa.net, sherpaandguru.com, and notebook.stc.org. You don’t need to be the most talkative, outgoing person in the room to be a leader. Instead, all you need to do is tap into … Continue reading