I’ve changed out one slide from the Spectrum14 presentation. Looking forward to presenting this to a crowd at the STC Summit in Phoenix.
I thought this came together pretty well and I had a great time presenting my first revision of A Techcomm Bestiary at STC Rochester’s Spectrum 2014. I may make a couple of slide changes before the STC Summit, but this is the meat of the presentation.
Putting this talk together was quite the experience, as I wandered through online pix from medieval bestiaries, reviewed techcomm roles, and read a little about animal symbolism.
Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education webinar on Thursday, June 5, at 5 pm EDT (GMT-4). I’ll provide registration details as soon as they’re available.
Here’s a general description of the seminar:
- Most technical communicators know the importance of securing their work and online presence, but are often concerned only about confidentiality. However, good security is about three areas: Confidentiality, Integrity, and Availability. The presenter will explain the importance of these areas to your work as technical communicators and provide tips for ensuring that both your work and online presence are secure.
Won’t you join me?
I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads.
24 February 2014, Security Awareness Panel, Upstate New York College Collaboration Information Technology Summit , Roberts Wesleyan College, 1200 Jefferson Road, Rochester, NY
23 March 2014, Empowering the Introvert Within: Becoming an Outstanding Leader, Mid Atlantic Technical Communication Conference, Philly Metro Chapter STC, Giant Conference Center, Willow Grove, PA
13 April 2014, Spectrum Leadership Day, STC Rochester, Rochester Institute of Technology, Rochester, NY
14 April 2014, A Techcomm Bestiary, Lightning Talk, Spectrum, STC Rochester, Rochester Institute of Technology, Rochester, NY
18 May 2014, Leadership Program, Society for Technical Communication Summit 2014, Phoenix, AZ
19 May 2014, A Techcomm Bestiary, Lightning Talk, Society for Technical Communication Summit 2014, Phoenix, AZ
I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful.
As we head towards our holiday break, remember that there are many scammers trying to trick you into revealing credit card numbers and other Private information–information that can be used for Identity Theft. As part of their attempts, we’re seeing an increase in phishing attempts–some disguised as delivery confirmations.
Follow these guidelines to help ensure your Private information (and your money) stays secure on the Internet.
Use a Secure Computer
- Make sure your computer meets the RIT Desktop and Portable Computer Standard before going online.
- Don’t use public computers to send private information over the Internet.
Use Strong Passwords
- Use a strong, unique password or passphrase where allowed. See our How to Create a Strong Password brochure for tips on choosing strong passwords.
- Take advantage of any additional security features offered by your bank.
Be alert for phishing and scams
- Never respond to an e-mail requesting that you reply with your login information. Scammers go to great lengths to make e-mails appear genuine, but no legitimate bank or retailer will ever ask you to submit private information by e-mail.
- Never give out a bank account number to anyone, and be wary of anyone who insists upon cash or wire transfer only.
Research the Company and Website
- Investigate any retailer you are considering using. How trustworthy are they?
- Check for negative reviews using a search engine.
- If you’re shopping at an auction site, check out the seller’s feedback.
Make Sure the Website Uses Encryption
- The address bar should begin with https (not just “http”) and there must be a padlock in your web browser (the location varies by browser, it usually appears in the address bar or the status bar at the bottom).
Monitor Your Accounts
- Keep track of all your purchases and account history from start to finish and beyond.
- Save copies of your orders and receipts, as well as e-mail confirmations and product descriptions.
- Follow up on your purchases by monitoring your bank account and credit card statements for any unauthorized transactions.
- You may also want to check your credit report annually (check for free at www.annualcreditreport.com).
Problems and Complaints
- If you think you have been a victim of identity theft, take action immediately.Contact your card issuer and follow their instructions.
- New York State Identity Theft – ID Theft Kit http://www.ag.ny.gov/sites/default/files/pdfs/publications/ID_Theft_Kit_2011.pdf
- Federal Trade Commission – Recover From Identity Theft http://www.consumer.ftc.gov/features/feature-0014-identity-theft
Online Shopping Complaints
- If you think you have been a victim of online shopping fraud and/or cannot resolve a problem with the seller, contact the following agencies:
- NYS Attorney General’s Office Consumer Complaint Form http://www.ag.ny.gov/internet-bureau-online-complaint-form?a=CF
- Better Business Bureau https://odr.bbb.org/odrweb/public/GetStarted.aspx
- Online Shopping Tips
- Phishing Tips
Have a good (safe) holiday!