|
|
|
| NUMBER 83 |
May, 2007 |
|
Click here to see an Adobe Acrobat PDF version of this newsletter, suitable for printing. Archives of CATPrints are available at
http://www.oneonta.edu/technology/comptech/newsletter/
|
|
Disaster Preparedness at home - where is your data stored?It was just about a year ago that flooding took many of us by surprise - and some of us ended up with a lot of damage to home and property. Many of us now have a lot of important information stored on our home computers - tax returns, copies of legal documents, photos of valuable property for insurance claims, and so on. We also keep a lot of personally important items; copies of family photos, sole copies of new digital photos, email, and other data. There's a great discussion on the importance of secure backups of your data at the SANS security website - see http://isc.sans.org/diary.html?storyid=2690 for more information and strategies to keep your data safe, secure and available.
|
|
Phishing keeps evolvingThe most recent "Microsoft Inside Office Newsletter" contains a link to this useful page about recognizing fake e-mails and phishing scams: http://www.microsoft.com/protect/yourself/phishing/identify.mspx. Phishing is when someone attempts to trick you into revealing personal information, such as credit card or social security numbers for fraudulent purposes. Common phishing scams involve legitimate looking e-mails (see the example at the link above) stating that your account at a bank, PayPal, etc, needs to be updated or will be closed if you do not respond. They often include a link to what appears to be a legitimate website where you will be asked to provide your personal information. Or you may get an e-mail asking you to click on a link to confirm your recent order at a business from which you haven't ordered. Protect yourself! Check out the page from Microsoft and learn how to recognize an e-mail scam. Then, when you receive one of those e-mails (and you will) delete it without responding or following any links! |
|
Alternatives to the traditional mouse and keyboardIt seems that every year a new crop of options pops up (say that ten times fast!) for the usual mouse-and-keyboard combination. See the possibilities for alternative pointing devices at http://web.mit.edu/atic/www/tools/mice.html and for some really wacky keyboards at http://web.mit.edu/atic/www/tools/keyboards.html. Courtesy of the fine folks at the Massachusetts Institute of Technology. |
|
Change that Password!Passwords are an important piece of the Oneonta IT Security strategy.
Chief among them is your Oneonta domain password which grants you access
to such services as computer logons, e-mail, web site authoring, dial-in
privileges and computer registration. Clearly, the risk to our private
network systems is great if your domain password is cracked or stolen.
It might be some time before the activity was detected as it would be
conducted with valid credentials - yours.
When selecting a new password, you should choose a phrase that is
easy to remember but hard to guess such as “2&2isfour” or “ilove
Mondays!” It is also a good idea to change your password early
in the day and early in the week. If you change it on Friday
afternoon, chances are you will not remember it on Monday morning!
If you have stored your password in any applications (such as Sophos
for home use) remember to change it in those applications as well.
Please choose a new password that meets the requirements above and
visit
https://www.oneonta.edu/useradmin/passwordchange.htm to
change it as soon as you are ready. |
|
|
If you have a question for Computer and Telecommunication Services about: Computer Problems or Related Issues - Call the
Information Technology Help Desk
at 436-4567 |
|