Engage! Creating a Meaningful Security Awareness Program (Updated)
7/12/12 Updated with seminar slides! Engage! Creating a Meaningful Security Awareness Program View more PowerPoint from Ben Woelk This may start quite the discussion, but it’s a viable argument that...
View ArticleSave the date! Bulletproofing Your Career Online live webinar 8/2, 4-5 pm EDT
Hannah Morgan and I will be presenting Bulletproofing Your Career Online as an STC webinar on Thursday, 2 August | 4:00–5:00 PM EDT (GMT-4) What are the 10 key steps to building and securing your...
View ArticleA Lightning Fast Introduction to Digital Self Defense
Each year at the Rochester Institute of Technology we introduce the concepts of Digital Self Defense to incoming students. We’ve tried a variety of presentation types and venues, ranging from several...
View ArticleDigital Self Defense for Incoming Students at RIT Presentation
We had a great time presenting to our 2800-person incoming class at the Rochester Institute of Technology. Here’s the YouTube video of the five presentations (Hannah Morgan, Dawn Soufleris, Nick...
View ArticleAmazing Mind Reader Security Awareness Video
One of our student workers at the RIT Information Security Office shared this security awareness video from YouTube. What do you think of it? … Continue reading →
View ArticleFacebook Security Audit
A friend shared this post by Ian Anderson Gray today. I think the information is pretty worthwhile. What do you think? … Continue reading →
View ArticleSimplifying Password Complexity
Let’s be honest. Passwords are a pain. We all know that it’s important to have different passwords for different places and we all know that they need to be fairly complex. We also know that...
View ArticleRIT InfoSec Awareness: an Interview With Ben Woelk
RIT InfoSec Awareness an Interview With Ben Woelk. Read my interview with RIT alumnus Neil DuPaul on the Veracode Blog where we discuss how we’re increasing information security awareness at the...
View ArticleInfosec Strategies: Creating Centralized Efficiencies in a Decentralized IT...
My thoughts on one of the challenges facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer. The institutional challenge of creating centralized...
View ArticleGuide Dogs and Information Security: Raising Them to Enable
My thoughts on another challenge facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer. We had the privilege of being puppy raisers for Guiding...
View ArticleCovert Affairs Gets It (mostly) Right
When television and movies use information security as their storyline, they typically pass up accuracy for the sake of drama. I was pleasantly surprised when a recent episode of Covert Affairs...
View ArticleDeveloping a Security Mindset
the goal of the module is to reorient students' thinking from the features of a product and how those features are supposed to be used to thinking about how someone might "hack" the product. In other...
View ArticleDigital Self Defense Workshop 101 (RRLC)
I had the pleasure of presenting the following presentation to the Rochester Regional Library Council on Oct. 25th. It contains general Internet and computer safety tips and is slightly modified from a...
View ArticleCall for Proposals, Spectrum 2011 (April 1, 2011)
Spectrum 2011 – Building Better Solutions: A Skills Symposium Rochester Chapter, Society for Technical Communication (STC) Submittal deadline: December 17, 2010 You and your colleagues are invited to...
View ArticleTop Ten Ways to Shockproof Your Use of Social Media
How do you stay safe online? Here are ten ways to shockproof your use of social media: Tip #1: Use strong passwords Tip #2: Keep your computer patched and updated Tip #3: Use appropriate security...
View ArticleWhy Professional Conferences Matter
I’ve heard a lot of discussion recently that professional conferences aren’t needed anymore because of the inter-connectivity afforded by the Internet. Why is it reasonable to spend hundreds or even a...
View ArticleTechnical Communicator 419 Scheme
The STC Europe SIG has a great parody post today on a Nigerian 419 scheme with a twist: They want access to your bank account to impose penalties for not turning the writing/editing assignments around...
View ArticleIrony
I received the following notification today: DHS Announces the Release of New Training Course Workplace Security Awareness No-Cost Critical Infrastructure Workplace Security Training The Department of...
View ArticleApps for Integrating Mobile Devices into Classroom Use and Campus Communications
How many of you are integrating mobile devices into classroom work? In addition to my role as Policy and Awareness Analyst, I teach a couple of classes, Cyber Self Defense and Effective Technical...
View ArticleMobile Devices: Paradigm Shift or Just Another Content Delivery Mechanism?
I’m curious about whether you think the integration of mobile devices into curricula is a “game changer/paradigm shift” or whether you regard it as just another content delivery mechanism. As a...
View Article