CISO Memo: An ISG New Year’s Resolution
As usual, when the New Year rolls around, we hear of many people (and organizations!) speaking of resolutions for the coming year. While declared in the true spirit of obtaining them, as we all know, many of these resolutions fall by the wayside rather early into the New Year.
The Information Security Group is committing to a resolution as well, and that is to continue our momentum in providing ever-improving security solutions in 2010. «more...»
Focus on Personal Security:
Scenario: The Roscoes are relaxing at home. Chris is streaming his favorite tv show from hulu.com while lying in bed, Sandy's in the kitchen checking out a recipe on Food Network website, Ginger's responding to a friend's Facebook status while lounging in the rec room, and Neighbor Ned is two houses away causing a vary serious performance hit on the Roscoe router by downloading multi-megabyte porn flicks. Oops! «more...»
This article expands on the security recommendations made in the companion piece "Secure Wireless at Home and on the Road", going into depth on the features you should look for in a home router and how to secure it. «more...»
IT Profile: Scott Thacher, Director of IT for Campus Life
Scott Thacher leads the overall business technology planning, implementation, and support for the division of Campus Life-- including infrastructure and architecture, networks, desktop integration, applications development, information security, and reengineering business processes.
Recently we were able to catch up with this busy individual and ask him a few questions about the challenges and rewards of his position. «more...»
Doing the Right Thing: Tips on Disaster Relief Scams
In the wake of the catastrophic earthquake in Haiti on the 12th of January, requests for aid were immediate and ubiquitous. New technology, such as Twitter, has enabled the rapid collection of donations, as reported by the New York Times, "Burst of Mobile Giving Adds Millions in Relief Funds". Countless website carry links to relief organizations and information on how to contribute. Among them, Brown's Swearer Center has compiled a list of possible organizations to accept relief donations.
With this rush to help, the Federal Trade Commission along with a multitude of new sources, warns of fraudulent organizations. «more...»
You probably remember the Nigerian banking scam and other outlandish emails that arrive in your mailbox with promises of instant wealth for little effort on your part, or pending doom if you don't answer immediately. They may amuse or simply be an annoying piece of email to delete. The problem is, the people who create and send these phishing emails keep getting better at it. «more...»
Visit our 2010 calendar web page to select just the right calendar to brighten your wall.
New Year, New Password
Here's a good but simple item to add to your list of New Year resolutions of good habits: start the new year with a new password. For the few moments that it will take, you will be rewarded with more secure data and peace of mind.
ISG suggests that when you put up your calendar for the new year (see above for our offerings), it's a good time to change your passwords as well. «more...»
It's 2010. Do you know where your data is?
January 28th marks the third annual Data Privacy Day, recognized in the United States, Canada, and 27 European countries, and established to raise awareness and generate discussion about data privacy and protection. The day offers an opportunity for businesses to examine their practices in managing data entrusted to them, as well as for individuals to assess the protection of their own personal information and consider how their online behavior may threaten their own data privacy. «more...»
Computer Jargon in Plain English
The December 2009 issue of the SANS Institute's security newsletter OUCH! carried the following article on computer jargon, reprinted to help put you in-the-know.
3G: Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.
4G: Fourth Generation cellular service or WIMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.
BROADBAND: Broad bandwidth networking. High-speed Internet connections, like DSL (Digital Subscriber Line), Cable Internet, and 3G (Third Generation) cellular services. «more...»
Protecting Brown Information in the Classroom and Online
Over 1,600 individuals have taken the "Protecting Brown Information" class to learn what constitutes "Brown Confidential Information"; where, when and how it's at risk; and what need to be done to mitigate that risk. Are you one of them?
Classes are held the third Wednesday of each month (sign up at the Training.brown.edu site) and also also available online for those unable to attend in person. Check there also for periodic Safe Computing Brown Bags. For access to the online class, or to make suggestions for brown bag topics, email us at email@example.com.