Tag Archives: social networking

  • 1

Amazing Mind Reader Security Awareness Video

Category:Information Security,Infosec Communicator,Internet Safety,Privacy,Social Networking,Uncategorized Tags : 

One of our student workers at the RIT Information Security Office shared this security awareness video from YouTube.

What do you think of it?


  • 1

Updated: 2012 Speaking Schedule, January through June

Category:EDUCAUSE,Higher Education,Information Security,Infosec Communicator,Internet Safety,Presentations,Social Networking,STC,STC Rochester,Summit Tags : 

I’ll be speaking at the following events this winter and spring. Watch for my presentation materials on SlideShare.

January 9: HEISC (Higher Education Information Security Council), Town Hall. Recording available.

January 30:  Bullet Proofing Your Career Online (with Hannah Morgan, @careersherpa), ABCPNG (Always Be Connecting Power Networking Group), First Unitarian Church, Rochester, New York

Description: What are the 10 key steps to building and securing your online reputation? A security professional and a career sherpa provide their perspectives on how to create an online presence that enhances and promotes your career safely and effectively.

April 23rd: Bullet Proofing Your Career Online (with Hannah Morgan, @careersherpa), STC Rochester Spectrum Conference, Rochester Institute of Technology, Rochester, New York

April 24th: Leadership Day, STC Rochester Spectrum Conference, Rochester Institute of Technology, Rochester, New York

Facilitating the event and the panel discussion

May 17: Engage! Creating a Meaningful Security Awareness Program (with Cherry Delaney, Purdue University), EDUCAUSE Security Professionals Conference 2012, Indianapolis, IN

 Abstract: This session will help attendees identify available resources and tools and determine the steps needed to create an engaging security awareness program. We’ll share how to integrate social media, video and other resources in an effort to reach a variety of audiences. We’ll also discuss how to leverage security incidents to create opportunities for engagement with your community. We’ll conclude the session by helping you plan a series of targeted activities for a high profile event such as the National Cyber Security Awareness Month.

May 20: Communications Liftoff! Rocketing your Community to the Stars, Leadership Day progression, STC Summit, Rosemont, IL

May 21: Bullet Proofing Your Career Online (with Hannah Morgan), STC Summit, Rosemont, IL

May 23: Shockproofing Your Use of Social Media 2012, STC Summit, Rosemont, IL

Description: Lightning Talk. What are the top ten ways to shockproof your use of social media? What’s new for 2012?
Enhanced by Zemanta

  • 3

Top Ten Tips for Safe(r) Social Networking

Category:Information Security,Infosec Communicator,Internet Safety,Privacy,Social Networking,Uncategorized Tags : 

No lifeguard on dutyDid you know you’re a target every time you go online? Did you know that cyber criminals are targeting social networking sites? Do you know how to recognize a phishing attempt? Following these tips will help make your use of social networking sites safer. (Unfortunately, there’s no way to guarantee that you can use them safely.)

Tip #1: Use strong passwords/passphrases.

It’s important to use strong passwords because automated “cracking” programs can break weak passwords in minutes. At a minimum, you should use 8 characters (preferably 15 or more), mixing upper and lower case letters and numbers. Many websites also allow the use of longer passwords and special characters. Incorporating special characters into your password will make them more difficult to crack. You’ll also want to use different passwords on different accounts. Using a password safe such as LastPass will help you manage these passwords by generating strong passwords and then supplying them when needed.

Tip #2: Keep up to date.

Attackers take advantage of vulnerabilities in software to place malware on your computers. Keeping up to date with patches/updates helps thwart attackers from using “exploits” to attack known vulnerabilities. It’s important to keep both your Operating System (Windows, Mac OS, linux, etc.) and your applications (Microsoft Office, Adobe, QuickTime) patched.

Tip #3: Use security software.

It’s a good practice to follow the requirements of the RIT Desktop and Portable Computer Security Standard on personally-owned computers. Among other elements, the standard requires use of a firewall, antivirus, and anti-spyware programs. Many security suites contain all of the elements needed to protect your computer. (Your Internet Service Provider may also provide security software.)

Tip #4: Learn to recognize phishing attacks.

You’ve all seen phishing attacks. They’re typically emails that appear to come from a financial institution that ask you to verify information by providing your username and password. Never respond to these requests. Your financial institution should not need your password.

Tip #5: Think before you post.

Don’t post personal information (contact info, class schedule, residence, etc.) A talented hacker can see this, even if you’ve restricted your privacy settings! Don’t post potentially embarrassing or compromising photos. Be aware of what photos you’re being “tagged” in—don’t hesitate to ask others to remove photographs of you from their pages.

Tip #6: Remember who else is online.

Did you know that most employers “Google” prospective employees? Have you seen the stories of people’s homes being burglarized because they’ve posted their vacation plans online? Many people other than your friends use these sites.

Tip #7: Be wary of others.

You can’t really tell who’s using a social network account. If you use Facebook, you’ve certainly seen posts by your “friends” whose accounts have been compromised. Don’t feel like you have to accept every friend request, especially if you don’t know the person.

Tip #8: Search for your name.

Have you ever done a “vanity search?” Put your name in a search engine and see what it finds. Did you know that Google allows you to set up an Alert that will monitor when your name appears online? Setting this up with daily notifications will help you see where your name appears.

Tip #9: Guard your personal information.

Identity thieves can put together information you share to develop a profile to help them impersonate you. Be especially careful of Facebook applications. They may collect information that they sell to marketing companies or their databases could be compromised. Do they really need the information they’re requesting?

Tip #10: Use privacy settings.

Default settings in most social networks are set to sharing all information. Adjust the social network’s privacy settings to help protect your identity. Show “limited friends” a cut-down version of your profile. Choose the strongest privacy settings and then “open” them only if needed.

Enhanced by ZemantaAdd me to your circle on Google+

  • 11

Unpacking My Takeaways from #STC11

Category:Infosec Communicator,STC,STC Rochester,Summit,techcomm,Uncategorized Tags : 

Open SuitcaseIt’s been a little less than two weeks since the Society for Technical Communication Summit in Sacramento ended. Summit was an intensive four day immersion in the multifaceted profession of technical communications. I wanted to share what I found really important about the event, before the memories fade. I’ll start unpacking my takeaways here and in future posts.

I hope you’ll take the opportunity to discuss what I’m unpacking and share what you unpacked when you got home by commenting on this post!

Here’s my Top Ten list of takeways:

  1. The strength (and pride) of STC lies in its communities. Over the last few years there have been questions about the value that geographic chapters provide in an era when people are increasingly connected online. The Pacesetter Awards show that innovation comes from the grassroots level, whether from a geographic chapter or SIG. Some of the communities have done outstanding work in building and documenting solutions that can be applied across STC. For example, the Carolina chapter broke new ground in providing webinars for their geographically diverse membership and in partnering with Southeastern Michigan and Rochester to co-deliver online content.
  2. Relationships between communities bear fruit. STC recognized several chapters and SIGs with Community Achievement Awards and Pacesetter Awards. What I found interesting about the communities receiving the awards was that key leaders of these communities consulted with, counseled, mentored, and exchanged ideas with each  other. These awards aren’t a competition. The recipients found ways to build each other up during the year. My conversations with community leaders during the year sparked much of what the Rochester chapter accomplished and helped us move forward in unanticipated ways.
  3. STC will continue to move forward as it provides value, although with an increasingly new base. Although I believe membership is down slightly from last year, STC is operating in the black and is continuing to add new members. (Personally, I believe the tide has turned.) The launch of key initiatives such as certification and MySTC should have a continuing impact as we move forward.
  4. Twitter played (and will continue to play) a key role at Summit. Twitter was used in two chief ways at Summit: to tweet and retweet session content and to facilitate face-to-face networking opportunities. The Twitter stream using the #stc11 hashtag provided an easy way to find out what was happening. There were more than 5000 tweets associated with the #stc11 hashtag in less than a week. That’s a lot of communication.
  5. There are some really committed and capable people in and moving into community leadership. I’m very impressed with the earnestness and ability of the people I had the pleasure of meeting and talking with during Leadership Day and afterwards. I’ve only gotten to know the leadership of Toronto, Philadelphia, Carolina, and Southeastern Michigan at all well. What I’m seeing in those chapters is encouraging and demonstrates a desire to serve their members and to  strengthen STC as a whole. They’re not in it for their own glory. They’re in it to make us better.
  6. Leadership Day provides a foundation of knowledge and, more importantly, connections for new community leaders. I can’t overstress the importance of Leadership Day for the new and current leaders. Last year, I found the sessions explaining the intricacies of community leadership for new leaders absolutely critical to moving our chapter forward. This year I was able to participate in the progressions where community leaders shared their insights for success (and their struggles), providing sparks for new ideas and solutions for overcoming common, but vexing issues we face. Although I didn’t know it at the time, the connections I made at Leadership Day last year became my chief contacts in discussing issues and opportunities at the community level.
  7. MySTC can play a key role in strengthening community. MySTC provides a social networking platform on which members (and invitees) can share ideas, “friend” each other, create discussion and task groups, share photos and videos, and CONNECT with other members. We’re still figuring out how to use it. It’s not perfect, but it’s really great to have an easy way to connect with members outside and inside our current communities. The innovators among us will jump in and determine ways for us to work collaboratively.
  8. The vote on student membership rights at the business meeting was profound. Student members of STC were never enfranchised to vote in international elections, although their rights varied at the community level. The business meeting saw discussion and a vote on a proposed amendment to give them the vote. The proponents for student voting rights spoke passionately when presenting their arguments for passage of the student voting amendment. Opponents, although fewer, were articulate in their defense of the status quo. The amendment required a two-thirds vote of the members present. The amendment passed handily and the atmosphere in the room was charged. I did not expect the feeling of accomplishment we had when the amendment was approved.
  9. Certification may help the profession, especially by providing credentials for technical communicators who do not have degrees that relate clearly to the profession. I have degrees in anthropology, church history, and am ABD on my PhD in early modern European history. This is not obvious preparation for a career in technical communications. I was concerned about credentials so that I could get past initial screenings. Certification can provide credentials for those of us who have “non-standard” educational backgrounds.
  10. The content of the sessions at Summit was great. Isn’t it interesting that the content at Summit was the last thing I listed in my top ten? I enjoyed (and learned something in) almost all of the sessions I attended. However, for me the chief benefit of the conference was establishing and strengthening connections. These people are my techcomm tribe. They get it.
Enhanced by Zemanta

[twitter-follow screen_name=’benwoelk’ show_count=’yes’]


  • 2

How Much Does Facebook Know About You? The Two Facebook Dogs Revisited

Category:Facebook,Information Security,Infosec Communicator,Internet Safety,Privacy,techcomm,Uncategorized Tags : 
I attended RIT’s Faculty Institute for Teaching and Learning this week. Mark Greenfield, SUNY Buffalo, delivered a keynote on “Born to be Wired: Technology, Communication, and the Millennial Generation.” There was a lot of useful content, and I encourage you to follow Mark Greenfield on Twitter (@markgr) and check out his resources posted on Delicious.
Among the many things Mark discussed was the ongoing issue of Facebook privacy settings and how difficulty they are to administer properly. He shared Rob Cottingham’s recent Noise to Signal Cartoon with us.


Noise to Signal Cartoon

Rob Cottingham had done an earlier cartoon on the subject as well:

Rob Cottingham was inspired by the famous Peter Steiner cartoon.

Does any of this matter to you?

How much do you worry about how Facebook handles your information? When you post on Facebook, do you think about who might have access to your information? Have you given up on protecting your privacy online?

I can only wonder what the next cartoon will be.

Related Links



Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner