Quantcast
Channel: Ben Woelk – BenWoelk.com
Browsing all 50 articles
Browse latest View live

Engage! Creating a Meaningful Security Awareness Program (Updated)

7/12/12 Updated with seminar slides! Engage! Creating a Meaningful Security Awareness Program View more PowerPoint from Ben Woelk This may start quite the discussion, but it’s a viable argument that...

View Article


Save the date! Bulletproofing Your Career Online live webinar 8/2, 4-5 pm EDT

Hannah Morgan and I will be presenting Bulletproofing Your Career Online as an STC webinar on Thursday, 2 August | 4:00–5:00 PM EDT (GMT-4) What are the 10 key steps to building and securing your...

View Article


A Lightning Fast Introduction to Digital Self Defense

Each year at the Rochester Institute of Technology we introduce the concepts of Digital Self Defense to incoming students. We’ve tried a variety of presentation types and venues, ranging from several...

View Article

Digital Self Defense for Incoming Students at RIT Presentation

We had a great time presenting to our 2800-person incoming class at the Rochester Institute of Technology. Here’s the YouTube video of the five presentations (Hannah Morgan, Dawn Soufleris, Nick...

View Article

Amazing Mind Reader Security Awareness Video

One of our student workers at the RIT Information Security Office shared this security awareness video from YouTube. What do you think of it? … Continue reading →

View Article


Facebook Security Audit

A friend shared this post by Ian Anderson Gray today. I think the information is pretty worthwhile. What do you think? … Continue reading →

View Article

Simplifying Password Complexity

Let’s be honest. Passwords are a pain. We all know that it’s important to have different passwords for different places and we all know that they need to be fairly complex. We also know that...

View Article

RIT InfoSec Awareness: an Interview With Ben Woelk

RIT InfoSec Awareness an Interview With Ben Woelk. Read my interview with RIT alumnus Neil DuPaul on the Veracode Blog where we discuss how we’re increasing information security awareness at the...

View Article


Infosec Strategies: Creating Centralized Efficiencies in a Decentralized IT...

My thoughts on one of the challenges facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer. The institutional challenge of creating centralized...

View Article


Guide Dogs and Information Security: Raising Them to Enable

My thoughts on another challenge facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer. We had the privilege of being puppy raisers for Guiding...

View Article

Covert Affairs Gets It (mostly) Right

When television and movies use information security as their storyline, they typically pass up accuracy for the sake of drama. I was pleasantly surprised when a recent episode of Covert Affairs...

View Article

Developing a Security Mindset

the goal of the module is to reorient students' thinking from the features of a product and how those features are supposed to be used to thinking about how someone might "hack" the product. In other...

View Article

Digital Self Defense Workshop 101 (RRLC)

I had the pleasure of presenting the following presentation to the Rochester Regional Library Council on Oct. 25th. It contains general Internet and computer safety tips and is slightly modified from a...

View Article


Call for Proposals, Spectrum 2011 (April 1, 2011)

Spectrum 2011 – Building Better Solutions: A Skills Symposium Rochester Chapter, Society for Technical Communication (STC) Submittal deadline: December 17, 2010 You and your colleagues are invited to...

View Article

Top Ten Ways to Shockproof Your Use of Social Media

How do you stay safe online? Here are ten ways to shockproof your use of social media: Tip #1: Use strong passwords Tip #2: Keep your computer patched and updated Tip #3: Use appropriate security...

View Article


Why Professional Conferences Matter

I’ve heard a lot of discussion recently that professional conferences aren’t needed anymore because of the inter-connectivity afforded by the Internet. Why is it reasonable to spend hundreds or even a...

View Article

Technical Communicator 419 Scheme

The STC Europe SIG has a great parody post today on a Nigerian 419 scheme with a twist: They want access to your bank account to impose penalties for not turning the writing/editing assignments around...

View Article


Irony

I received the following notification today: DHS Announces the Release of New Training Course Workplace Security Awareness No-Cost Critical Infrastructure Workplace Security Training The Department of...

View Article

Apps for Integrating Mobile Devices into Classroom Use and Campus Communications

How many of you are integrating mobile devices into classroom work? In addition to my role as Policy and Awareness Analyst, I teach a couple of classes, Cyber Self Defense and Effective Technical...

View Article

Mobile Devices: Paradigm Shift or Just Another Content Delivery Mechanism?

I’m curious about whether you think the integration of mobile devices into curricula is a “game changer/paradigm shift” or whether you regard it as just another content delivery mechanism. As a...

View Article
Browsing all 50 articles
Browse latest View live