Author Archives: Ben

  • 0

The Secure Communicator–upcoming webinar

Category:Bulletproofing,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,mobile device,password,Privacy,Risk,STC Tags : 

Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education webinar on Thursday, June 5, at 5 pm EDT (GMT-4). I’ll provide registration details as soon as they’re available.

Here’s a general description of the seminar:

  • Most technical communicators know the importance of securing their work and online presence, but are often concerned only about confidentiality. However, good security is about three areas: Confidentiality, Integrity, and Availability. The presenter will explain the importance of these areas to your work as technical communicators and provide tips for ensuring that both your work and online presence are secure.

Won’t you join me?


  • 0

Cyber Self Defense Reading List

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Risk Tags : 

Cyber Self Defense Reading List

I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads.

Enhanced by Zemanta

  • 0

Beware of Good Ole Scammer Claus

Category:Information Security,Infosec Communicator,Internet Safety,Privacy,Risk Tags : 

I’m sharing the contents of an advisory I sent out to the RIT community regarding holiday scams and phishing attempts. I think you’ll find the information helpful.

scammer-clausBeware of Good Ole Scammer Claus!

As we head towards our holiday break, remember that there are many scammers trying to trick you into revealing credit card numbers and other Private information–information that can be used for Identity Theft. As part of their attempts, we’re seeing an increase in phishing attempts–some disguised as delivery confirmations.

Follow these guidelines to help ensure your Private information (and your money) stays secure on the Internet.

Use a Secure Computer

Use Strong Passwords

  • Use a strong, unique password or passphrase where allowed. See our How to Create a Strong Password brochure for tips on choosing strong passwords.
  • Take advantage of any additional security features offered by your bank.

 Be alert for phishing and scams

  • Never respond to an e-mail requesting that you reply with your login information. Scammers go to great lengths to make e-mails appear genuine, but no legitimate bank or retailer will ever ask you to submit private information by e-mail.
  • Never give out a bank account number to anyone, and be wary of anyone who insists upon cash or wire transfer only.

Research the Company and Website

  • Investigate any  retailer you are considering using. How trustworthy are they?
  • Check the company’s privacy policy.
  • Check for negative reviews using a search engine.
  • If you’re shopping at an auction site, check out the seller’s feedback.

Make Sure the Website Uses Encryption

  • The address bar should begin with https (not just “http”) and there must be a padlock in your web browser (the location varies by browser, it usually appears in the address bar or the status bar at the bottom).

Monitor Your Accounts

  • Keep track of all your purchases and account history from start to finish and beyond.
  • Save copies of your orders and receipts, as well as e-mail confirmations and product descriptions.
  • Follow up on your purchases by monitoring your bank account and credit card statements for any unauthorized transactions.
  • You may also want to check your credit report annually (check for free at www.annualcreditreport.com).

Problems and Complaints

Identity Theft

Online Shopping Complaints

Additional Links

Have a good (safe) holiday!

Enhanced by Zemanta

  • 0

A Techcomm Bestiary–My Next Lightning Talk

Category:Infosec Communicator,techcomm Tags : 

Manticore

I’m developing a new lightning talk using the concept of a medieval bestiary.

A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter.

This Lightning Talk will provide a bestiary of techcomm practitioners, many of which you WILL encounter in the course of your career. Join me for an enjoyable look at today’s techcomm beasts.

Attendees will enjoy seeing to which beasts they and their colleagues are most similar. Note that any resemblance to actual techcomm practitioners is purely coincidental. No actual techcomm practitioners will be harmed in the production of this lightning talk.

I’m planning on tieing medieval images to techcomm careers and/or individuals. What do you all think about that?

I’ll be presenting this Lightning Talk at the STC Summit 14 in Phoenix in May.


  • 0

Technical Communications Skills Map

Category:Infosec Communicator,Leadership,STC,techcomm Tags : 

techcomm skills map

Technical Communications Skills Map | Red Gate Software Development.

Have you wondered about the job possibilities available to you as a technical communicator? This skills map by Brian Harris provides a great view of where core techcomm skills can take you. (Please note that the original post is no longer available. I’ve linked to a higher-resolution image Kai Weber saved.)

Are there any areas you would add? For me, information security fits into both domain expertise and risk management.

The Society for Technical Communication provides a great place to learn about techcomm and develop the networking connections to take you along your career path. If you’re interested in techcomm, check us out.

 

Skill map, wicked ambiguity & influence at #STC14

Enhanced by Zemanta

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner