On September 25th at 4pm in Sayles Hall, please join us in welcoming Joseph M. Tucci, Chairman and Chief Executive Officer of EMC Corporation. He will be presenting Cloud Meets Big Data: An Insider’s Look at the Information Technology Industry, the first of the Distinguished Lecture Series: Leadership in Technology.
Hear how the technology mega trends of social media, mobile devices, big data and cloud computing are reshaping business. Tucci will provide an insider’s perspective of the disruptive technology changes occurring in the marketplace — and their implications for the rest of us and our future.
This lecture will be broadcast live at http://brown.edu/web/livestream.
Share or save this event:
As Brown prepares to participate and celebrate in National Cyber Security Awareness Month (NCSAM) for the 10th year, I thought that I would cover a question that gets brought to me a great deal: "You used to be IT security, but now you're Information Security. What's the big deal?"
For many years (actually since security became a technology discipline), those responsible for the security function were most commonly known as IT Security. This was for good reason, as the focus and responsibility was predominantly IT-centric (firewalls, switches, subnets, IDS, IPS, etc). Brown had an IT Security function, as well as IT security roles in the network group. However, as the technology evolved and changed, so did the role.
When I first arrived at Brown over six years ago, one of the first tasks as CISO was to brand the newly formed group in my area. While we still had network security responsibilities at that time, the Brown Information Security Group was formed. While the staffing and organization of the group has changed over the years, the mission to focus on Information Security has not. Brown still maintains an excellent network (or "IT") security function, who expertly aid in the design, management, monitoring and operation of securing the University network. That will never go away, and they play a key role in ensuring that the bad guys stay out.
However, today information security is much broader than simply the network. The ISG mission covers all aspects of the security of Brown's data and information, including privacy, compliance, awareness, response and risk management. It also includes not only electronic information, but hard copy data as well. As a result, information security also plays a key role in records management and reducing risk at Brown through participating in several committees that focus on this issue, reviewing grants and contracts for aspects of data ownership, use and sharing, and by supplying solutions to identify, protect and dispose of information in a secure manner. No longer is information security simply responsible for maintaining a secure network, but now plays a key role in risk and reputation management for the university.
As always, I welcome your comments and feedback. Please feel free to reach out to me directly at firstname.lastname@example.org, or the group at ISG@brown.edu. Let me know how we are doing, areas of concern you may have, or questions on protecting your identity, privacy or personal computing security. And remember, sec_rity is not complete without U!
Making travel plans? Here are ISG's Ten Travel Tips for your mobile device, especially for those traveling outside of the U.S. Please take a few moments to review them as an ounce of prevention now can save a pound of trouble later.
- Contact your cellular provider several weeks before you travel to discuss and activate the most cost-effective plan to fit your needs. For Brown devices, contact Telecommunications at 863-2007 or email@example.com. For non-Brown devices, users can contact their cellular provider directly.
- For phones, familiarize yourself with international roaming and data charges. We recommend turning off or setting a limit on cellular data usage for your smartphone to prevent incurring significant fees.
- Consider using Google+ Hangouts to bypass the phone. See the About Hangouts site for help on getting started.
- When traveling with a laptop, remove all PII from it or encrypt it. If possible, we recommend using a laptop specifically designated for travel with no personal information on it. Note: CIS has loaner laptops for faculty, staff and grad students who are working on projects when traveling abroad. The loaners can be signed out at the Computer Service & Repair window.
- Become aware of and comply with all export controls. For example, some countries ban or severely regulate the use of encryption, you should check country-specific information before traveling with an encrypted laptop. See the BitLocker (Windows) or FileVault 2 (Macs) article for information on international traveling restrictions.
- Set a strong password or passcode for your device. Here are some ideas on how to create a strong and memorable password.
- Make sure all operating system and anti-malware software is current. If you haven't installed an anti-malware client for your phone, do so.
- Install device finder software, such as Computrace (for laptops) or Lookout (for tablets and phones).
- Use VPN to connect to Brown's network when away from it. CIS offers both a web and client versions. If you haven't used VPN before, test it before leaving.
- Make sure you have contact information for your local IT support professional and the Help Desk before you leave (firstname.lastname@example.org, 863-4357).
Check out Prepare Your Laptop for Traveling for more tips.
Many faculty and staff in Brown departments currently use Department File Services to share files with others in their departments and back up files (instead of keeping them on local hard drives, which can lead to data loss). Over the next month, CIS will be upgrading the technology behind Department File Services to provide an improved experience, reliability, and more space.
What to expect
Before and after the migration, you will receive an email from your departmental computing representative (ITSC or DCC) with the date of the migration and instructions for accessing your Departmental File Services after the migration. File shares will be unavailable from midnight until approximately 8AM on the day of your migration, so you should save and close all open shared files before the migration begins.
Accessing shared drives after migration
Most Windows users with Brown-owned computers will not need to take action; the shared S: and U: drives on your computers will automatically be mapped to the new location the first time you restart your computer after the migration. If you connected manually and the change doesn't happen automatically, see Connecting to Departmental File Services on Windows.
Since Mac users connect manually, they will need to use updated addresses to connect to shared drives. These updated addresses start with smb:// files.brown.edu/dfs/. For full instructions, see Connecting to Departmental File Services on a Mac.
Though the permissions of files will not change, please note that people will now only be able to view files they can access. This should reduce confusion.
Restoring backed-up copies of DFS files
You will have access to snapshots/backups of your files; hourly backups can be accessed for 48 hours, daily backups are kept for 6 weeks, and monthly backups are kept for 6 months. For instructions, see the following articles:
- Restore a File from Department File Services in Windows
- Restore a File from Department File Services on a Mac
During another upcoming project, we will be able to redirect Windows users’ My Documents and Desktop folders to this storage, making it even easier for Brown to prevent data loss while still being able to work on files offline.
Earlier this year, Google Calendar started automatically including a Hangout (video conference) link in every calendar event. This change has caused confusion for events that are held in person or utilize other conferencing options such as WebEx. For this reason, we will be disabling the automatic addition of Hangouts on Wednesday 7/16.
You will still be able to easily add Hangout links to calendar events by clicking the "Add a Google+ Hangout" link, but they will no longer automatically appear on every event. If you plan use Hangouts in any upcoming events, please review your calendar after this feature is disabled and add them where necessary.
Curious about Hangouts? Find out how to use them in our article Create and Use a Google Hangout.
Over the coming year, we will be upgrading Brown’s wireless network to offer faster speeds, better connectivity and roaming, more device support, and additional access points.
As a part of this change, we will be retiring the Brown-Secure and Brown_EZ networks and replacing them with a single, secure network called "Brown". Brown-Guest and Eduroam will remain available for guests. Our timeline is as follows:
July 21st: a new network called “Brown” will become available in all areas covered by the wireless network.
July 24th: The Brown_EZ network will be retired.
July 21st through August 11th: Brown-Secure and Brown will be simultaneously available to give people time to connect.
August 11th: Brown-Secure will be retired. The available networks will be Brown, Brown-Guest, and Eduroam.
During the three weeks between July 21st and August 11th, everyone on the Brown campus should connect to the new network by visiting http://wifi.brown.edu on a computer or mobile device. Those who are not on campus can do so when they return.
We will update you about our progress as we install access points and test various devices on the new network.
We're excited to announce that Rosetta Stone is now available at Brown, with online access to 30 languages (no download necessary). To get started, visit http://rosettastone.brown.edu and log in with your Brown username and password. If you are planning to use the mobile app, you will have to log in on a computer first. For set-up instructions, support information, and known issues, visit http://brown.edu/go/rosettastonehelp. If you have any questions or need additional help, please contact our IT Service Center.
CIS is excited to announce an important addition to our software portfolio, LabVIEW! LabVIEW is a development environment for problem solving and measurement or control systems. The software is supported by National Instruments, but the IT Service Center can assist with installation.