[2404] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, October 4, 2011

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Oct 4 15:34:34 2011

From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Tue, 4 Oct 2011 15:33:38 -0400
Message-ID: <CAB0D7D2.1D710%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============1113591636=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============1113591636==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_CAB0D7D21D710myeatonexchangemitedu_"

--_000_CAB0D7D21D710myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable


In this issue:


1. October is National Cyber Security Awareness Month

2. MIT Open Wireless Networks Retiring, Switch to Secure Wireless

3. Phishing Revisited


----------------------------------------------------------------------

1. October is National Cyber Security Awareness Month

----------------------------------------------------------------------


It=92s that time of year again! October is National Cyber Security Awarenes=
s Month.



Help raise awareness with faculty, staff, and students in October by promot=
ing National Cyber Security Awareness Month (NCSAM). EDUCAUSE is one of the=
 sponsors of the campaign, as many higher education institutions hold secur=
ity awareness events in October. If you plan on doing something around this=
 topic, please share your plans and any applicable URL=92s by sending an e-=
mail to security-council@educause.edu<mailto:security-council@educause.edu?=
subject=3DNCSAM%202011%20Plans> so your activities can be included with the=
 list of 2011 campus events.


Suggested resources:


 *   NCSAM resource kit < https://wiki.internet2.edu/confluence/display/its=
g2/NCSAM+Resource+Kit >
 *   NCSAM sample kit < https://wiki.internet2.edu/confluence/display/itsg2=
/NCSAM+Sample+Kit >
 *   MS-ISAC toolkit < http://msisac.cisecurity.org/resources/toolkit/ >
 *   OnGuardOnline < http://onguardonline.gov<http://onguardonline.gov/>/ >
 *   StaySafeOnline < http://www.staysafeonline.org/ncsam >
 *   Homeland Security's "Stop.Think.Connect." campaign < http://www.dhs.go=
v/files/events/stop-think-connect.shtm >
 *   StopThinkConnect < http://stopthinkconnect.org<http://stopthinkconnect=
.org/>/ >


MIT will also be doing its part. The IT Security team will post information=
 on the IS&T website throughout the month. Stay tuned. If you have any sugg=
estions or questions about what can be done to raise awareness at MIT, plea=
se contact me directly at myeaton@mit.edu.



---------------------------------------------------------------------------=
-----------

2. MIT Open Wireless Networks Retiring, Switch to Secure Wireless

---------------------------------------------------------------------------=
-----------


The open wireless networks, MIT and MIT N, will be retired in January 2012 =
as part of an IT roadmap to secure the MIT network < http://web.mit.edu/itg=
c/roadmaps.html >. The other existing networks, MIT SECURE, MIT SECURE N an=
d MIT GUEST will remain in place.


With more people using Wi-Fi on the MIT campus, it's riskier to be on open =
networks. Open (unencrypted) wireless networks could allow others in the vi=
cinity to see which web sites you visit or the search terms you type into b=
rowsers. Others could even gain access to your online accounts while you br=
owse.


To mitigate these risks and for a smooth transition in January, IS&T recomm=
ends users start connecting via the secure wireless networks right away; th=
ey are encrypted and require an MIT username and password to access.


NOTE: If you have not changed your Kerberos password since June 2010, you w=
ill need to do so prior to connecting to the secure wireless network. You c=
an change your password online: < https://ca.mit.edu/ca/cpw >


Additional information and instructions are listed in this article: < http:=
//ist.mit.edu/news/open_networks_retirement >



---------------------------

3. Phishing Revisited

---------------------------


A colleague recently reminded me that what we think we know and what we do =
know about phishing might not always be the same thing. In any case, it doe=
sn't hurt to remind ourselves of the clues that indicate when an email is s=
pam attempting to extract personal information.


If you feel you need to brush up on this information, we have an article in=
 the knowledge base listing the things to look for: < http://kb.mit.edu/con=
fluence/x/SBhB >



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D


Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_CAB0D7D21D710myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
 -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><br></p><p style=3D"margin: 0.0=
px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. October=
 is National Cyber Security Awareness Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. MIT Ope=
n Wireless Networks Retiring, Switch to Secure Wireless</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3.&nbsp;Ph=
ishing Revisited</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. October=
 is National Cyber Security Awareness Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">It=92s tha=
t time of year again! October is National Cyber Security Awareness Month.</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">&nbsp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Help raise=
 awareness with faculty, staff, and students in October by promoting Nation=
al Cyber Security Awareness Month (NCSAM).&nbsp;EDUCAUSE is one of the spon=
sors of the campaign, as many higher education institutions hold security a=
wareness events in October. If you plan on doing something around this topi=
c, please share your plans and any applicable URL=92s by sending an e-mail =
to&nbsp;<a href=3D"mailto:security-council@educause.edu?subject=3DNCSAM%202=
011%20Plans"><span style=3D"color: #203af9">security-council@educause.edu</=
span></a>&nbsp;so your activities can be included with the list of 2011 cam=
pus events.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Suggested =
resources:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">NCSAM resource kit &lt;&nbsp;<a href=
=3D"https://wiki.internet2.edu/confluence/display/itsg2/NCSAM&#43;Resource&=
#43;Kit">https://wiki.internet2.edu/confluence/display/itsg2/NCSAM&#43;Reso=
urce&#43;Kit</a>&nbsp;&gt;</span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">NCSAM sample kit &lt;&nbsp;<a href=3D=
"https://wiki.internet2.edu/confluence/display/itsg2/NCSAM&#43;Sample&#43;K=
it">https://wiki.internet2.edu/confluence/display/itsg2/NCSAM&#43;Sample&#4=
3;Kit</a>&nbsp;&gt;</span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">MS-ISAC toolkit &lt;&nbsp;<a href=3D"=
http://msisac.cisecurity.org/resources/toolkit">http://msisac.cisecurity.or=
g/resources/toolkit</a>/ &gt;</span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">OnGuardOnline &lt;&nbsp;<a href=3D"ht=
tp://onguardonline.gov/">http://onguardonline.gov</a>/ &gt;</span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">StaySafeOnline &lt;&nbsp;<a href=3D"h=
ttp://www.staysafeonline.org/ncsam">http://www.staysafeonline.org/ncsam</a>=
&nbsp;&gt;</span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Homeland =
Security's &quot;Stop.Think.Connect.&quot; campaign &lt;&nbsp;<a href=3D"ht=
tp://www.dhs.gov/files/events/stop-think-connect.shtm"><span style=3D"color=
: #1e37ee">http://www.dhs.gov/files/events/stop-think-connect.shtm</span></=
a>&nbsp;&gt;</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">StopThinkConnect &lt;&nbsp;<a href=3D=
"http://stopthinkconnect.org/">http://stopthinkconnect.org</a>/ &gt;</span>=
</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Calibri; min-heig=
ht: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">MIT will a=
lso be doing its part. The IT Security team will post information on the IS=
&amp;T website throughout the month. Stay tuned. If you have any suggestion=
s or questions about what can be done to raise awareness at MIT, please con=
tact me directly at myeaton@mit.edu.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. MIT Ope=
n Wireless Networks Retiring, Switch to Secure Wireless</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The open w=
ireless networks, MIT and MIT N, will be retired in January 2012 as part of=
 an IT roadmap to secure the MIT network &lt; <a href=3D"http://web.mit.edu=
/itgc/roadmaps.html"><span style=3D"text-decoration: underline ; color: #1e=
37ee">http://web.mit.edu/itgc/roadmaps.html</span></a>&nbsp;&gt;. The other=
 existing networks, MIT SECURE, MIT SECURE N and MIT GUEST will remain in p=
lace.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">With more =
people using Wi-Fi on the MIT campus, it's riskier to be on open networks. =
Open (unencrypted) wireless networks could allow others in the vicinity to =
see which web sites you visit or the search terms you type into browsers. O=
thers could even gain access to your online accounts while you browse.&nbsp=
;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To mitigat=
e these risks and&nbsp;for a smooth transition in January, IS&amp;T recomme=
nds users start connecting via the secure wireless networks right away; the=
y are encrypted and require an MIT username and password to access.&nbsp;</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">NOTE: If y=
ou have not changed your Kerberos password since June 2010, you will need t=
o do so prior to connecting to the secure wireless network. You can change =
your password online: &lt; <a href=3D"https://ca.mit.edu/ca/cpw"><span styl=
e=3D"text-decoration: underline ; color: #1e37ee">https://ca.mit.edu/ca/cpw=
</span></a>&nbsp;&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Additional=
 information and instructions are listed in this article: &lt; <a href=3D"h=
ttp://ist.mit.edu/news/open_networks_retirement"><span style=3D"text-decora=
tion: underline ; color: #1e37ee">http://ist.mit.edu/news/open_networks_ret=
irement</span></a>&nbsp;&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Phishin=
g Revisited</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A colleagu=
e recently reminded me that what we think we know and what we do know about=
 phishing might not always be the same thing. In any case, it doesn't hurt =
to remind ourselves of the clues that indicate when an email is spam attemp=
ting to extract personal information.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you fee=
l you need to brush up on this information, we have an article in the knowl=
edge base listing the things to look for:&nbsp;&lt; <a href=3D"http://kb.mi=
t.edu/confluence/x/SBhB"><span style=3D"text-decoration: underline ; color:=
 #1e37ee">http://kb.mit.edu/confluence/x/SBhB</span></a>&nbsp;&gt;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments&nbsp;online&nbsp;at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p></div><div><br></div><div><div style=3D"word-wrap: break=
-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; fon=
t-family: Helvetica; "><span class=3D"Apple-style-span" style=3D"border-col=
lapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-ver=
tical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size:=
 14px; font-style: normal; font-variant: normal; font-weight: normal; lette=
r-spacing: normal; line-height: normal; -webkit-text-decorations-in-effect:=
 none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: no=
ne; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bord=
er-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rg=
b(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; fo=
nt-variant: normal; font-weight: normal; letter-spacing: normal; line-heigh=
t: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -web=
kit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space: =
normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" st=
yle=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -=
webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helv=
etica; font-size: 14px; font-style: normal; font-variant: normal; font-weig=
ht: normal; letter-spacing: normal; line-height: normal; -webkit-text-decor=
ations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; t=
ext-transform: none; orphans: 2; white-space: normal; widows: 2; word-spaci=
ng: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
 -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px;=
 "><br></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-sp=
an" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; ">Monique Yeaton</span></span></span></s=
pan></span></span></div><div style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
 style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">IT Security Communication=
s Consultant</span></span></span></span></span></span></div><div style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
 12px; ">MIT Information Services &amp; Technology (IS&amp;T)</span></span>=
</span></span></span></span></div><div style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><sp=
an class=3D"Apple-style-span" style=3D"font-size: 12px; ">(617) 253-2715</s=
pan></span></span></span></span></span></div><div style=3D"font-size: 12px;=
 "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">http:=
//ist.mit.edu/security</span></span></span></span></span></span></div><div =
style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder"></div><br=
 class=3D"Apple-interchange-newline"></span></span></span></span></span></s=
pan></span></div></div></div></div></body></html>

--_000_CAB0D7D21D710myeatonexchangemitedu_--

--===============1113591636==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1113591636==--

home help back first fref pref prev next nref lref last post