Tag Archives: Information Technology

  • 0
Shockproofing Book Cover

Shockproofing Your Use of Social Media eBook available!

Category:Cyberstalking,Facebook,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,mobile device,password,Privacy,Risk,Social Networking Tags : 

Shockproofing Book CoverMy Shockproofing Your Use of Social Media: 10 Things You Should Know eBook is now available on Kindle!

For those of you who have attended one of my Lightning Talks about Internet Safety, this book fleshes out my recommendations for keeping safe online.

Please consider buying a copy. You’re welcome to lend your copy out and the book is also available from the Kindle Owners Lending Library and Kindle Unlimited.

If you read it, please leave a review!

If you’re interested, Nick Francesco and I are authoring a series of Your Guru Guides on computing-related subjects. (Search on Amazon for “your guru guides” to see what’s currently available.)

 

 


  • 0

  • 0

Updated Shock-proofing your Use of Social Media Presentation

Category:Facebook,Higher Education,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,password,Presentations,Privacy,Risk,Social Networking,STC,STC Rochester,Summit Tags : 

I’ve updated my Shock-proofing your Use of Social Media presentation for the Fall 2014 New Student Orientation program at the Rochester Institute of Technology. I’ve changed the passphrase example, added a new cartoon, and generally worked to make the presentation more culturally relevant to 18 to 20 year olds.

Let me know what you think of it!


  • 0

The Secure Communicator–upcoming webinar

Category:Bulletproofing,Information Security,Infosec Communicator,Internet Safety,Lessons Learned,mobile device,password,Privacy,Risk,STC Tags : 

Has the Heartbleed bug made you more aware of the challenges you face trying to protect confidential or private information online? I’ll address the impacts of Heartbleed and other threats to your security in “The Secure Communicator,” an STC Education webinar on Thursday, June 5, at 5 pm EDT (GMT-4). I’ll provide registration details as soon as they’re available.

Here’s a general description of the seminar:

  • Most technical communicators know the importance of securing their work and online presence, but are often concerned only about confidentiality. However, good security is about three areas: Confidentiality, Integrity, and Availability. The presenter will explain the importance of these areas to your work as technical communicators and provide tips for ensuring that both your work and online presence are secure.

Won’t you join me?


  • 0

Cyber Self Defense Reading List

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Risk Tags : 

Cyber Self Defense Reading List

I’ve created a reading list of books about Cyber Security suitable for both general readers and readers with a technical background. If there’s something you think I should add, either comment here or on the list in Goodreads.

Enhanced by Zemanta

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner