Quantcast
Channel: Ben Woelk – BenWoelk.com
Browsing all 50 articles
Browse latest View live

Secure Mobile-an Oxymoron? (Redux)

Responses to the #1 topic on IdeaScale, “Consumers dictate device usage, not IT,” indicate that MANY of you believe consumers will drive smartphone adoption in Higher Education, while the sentiment...

View Article


Digital Self Defense for Technical Communicators, Part One

Digital Self Defense for Technical Communicators was first published in the Society for Technical Communication‘s Intercom magazine in November 2010. I’ll be reproducing the article in several parts...

View Article


Digital Self Defense for Technical Communicators, Part Two

Digital Self Defense for Technical Communicators was first published in the Society for Technical Communication‘s Intercom magazine in November 2010.  Best Practices for Safer Social Networking...

View Article

Digital Self Defense for Technical Communicators, Part Three

Digital Self Defense for Technical Communicators was first published in the Society for Technical Communication‘s Intercom magazine in November 2010. How We’ve Communicated These Concepts at RIT Higher...

View Article

Communications Liftoff! Rocketing Your Community to the Stars

Society for Technical Communication Summit Conference Leadership Day Presentation, May 15, 2011 Join the discussion on MySTC at https://ow.ly/51WfG Communications liftoff! rocketing your community...

View Article


Twitter Use at #STC11 Summit

Last year, I kicked off this blog by posting about Twitter Use at the #STC10 Summit in Dallas. I thought it would be interesting to look at Twitter use at #STC11 as well. Methodology I’ve only analyzed...

View Article

Ten Ways to Shockproof Your Use of Social Networking Lightning Talk

I had the privilege of presenting my 25-minute presentation on Shockproofing Your Use of Social Media as a five-minute Lightning Talk at the STC Summit in Sacramento on May 18th. Lightning talks...

View Article

How Much Does Facebook Know About You? The Two Facebook Dogs Revisited

I attended RIT’s Faculty Institute for Teaching and Learning this week. Mark Greenfield, SUNY Buffalo, delivered a keynote on “Born to be Wired: Technology, Communication, and the Millennial...

View Article


Unpacking My Takeaways from #STC11

It’s been a little less than two weeks since the Society for Technical Communication Summit in Sacramento ended. Summit was an intensive four day immersion in the multifaceted profession of technical...

View Article


Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking

Are you as a parent worried about what your kids may encounter online? Are you unsure of how they or you can stay safe online when using social networking sites?  Although our kids are now college...

View Article

Avoiding Phishing

What’s the easiest way to break into a computer account? Cracking the password? Putting a trojan on the computer? Hacking? Unfortunately, it’s simply tricking you into giving up your password through a...

View Article

Choosing the Safest Browser, Part 2

Safe Practices Check your Browser Security Settings How can you tell how secure your web browser may be? Scanit’s Browser Security Test checks your browser security settings and provides a report...

View Article

Updated: Choosing the Safest Browser, Part One

This post provides an update to last year’s Choosing the Safest Browser post. Let’s take a look at what’s changed since June 2010. Browsers Last year, we looked at the following browsers to discuss...

View Article


Top Ten Tips for Safe(r) Social Networking

Did you know you’re a target every time you go online? Did you know that cyber criminals are targeting social networking sites? Do you know how to recognize a phishing attempt? Following these tips...

View Article

Announcing the RIT Cyber Self Defense Student Blog

I teach a section of Cyber Self Defense, a security awareness course at the Rochester Institute of Technology. We always have a number of interesting discussions about current infosec issues. I believe...

View Article


Making Information Security Fun

I shared this presentation at the October program meeting of the Rochester Chapter of the Society for Technical Communication. The presentation demonstrates how the Information Security Office at the...

View Article

Updated: 2012 Speaking Schedule, January through June

I’ll be speaking at the following events this winter and spring. Watch for my presentation materials on SlideShare. January 9: HEISC (Higher Education Information Security Council), Town Hall....

View Article


Avoiding the Botnet Snare

“Why would anyone attack my computer? I don’t have anything of value on it.” Is this your mindset? Although the goal of many attacks may be identity theft or financial gain, there are other reasons for...

View Article

Updated: 2012 Speaking Schedule, January through June

Updated 4/4/12 The post Updated: 2012 Speaking Schedule, January through June appeared first on BenWoelk.com.

View Article

Scholarship : … Technical Editing SIG, a special interest group of the...

https://www.stc-techedit.org/Scholarship The post Scholarship : … Technical Editing SIG, a special interest group of the Society for Technical Communication (STC) appeared first on BenWoelk.com.

View Article
Browsing all 50 articles
Browse latest View live