[2404] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, October 4, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Tue Oct 4 15:34:34 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Tue, 4 Oct 2011 15:33:38 -0400
Message-ID: <CAB0D7D2.1D710%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============1113591636=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============1113591636==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CAB0D7D21D710myeatonexchangemitedu_"
--_000_CAB0D7D21D710myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. October is National Cyber Security Awareness Month
2. MIT Open Wireless Networks Retiring, Switch to Secure Wireless
3. Phishing Revisited
----------------------------------------------------------------------
1. October is National Cyber Security Awareness Month
----------------------------------------------------------------------
It=92s that time of year again! October is National Cyber Security Awarenes=
s Month.
Help raise awareness with faculty, staff, and students in October by promot=
ing National Cyber Security Awareness Month (NCSAM). EDUCAUSE is one of the=
sponsors of the campaign, as many higher education institutions hold secur=
ity awareness events in October. If you plan on doing something around this=
topic, please share your plans and any applicable URL=92s by sending an e-=
mail to security-council@educause.edu<mailto:security-council@educause.edu?=
subject=3DNCSAM%202011%20Plans> so your activities can be included with the=
list of 2011 campus events.
Suggested resources:
* NCSAM resource kit < https://wiki.internet2.edu/confluence/display/its=
g2/NCSAM+Resource+Kit >
* NCSAM sample kit < https://wiki.internet2.edu/confluence/display/itsg2=
/NCSAM+Sample+Kit >
* MS-ISAC toolkit < http://msisac.cisecurity.org/resources/toolkit/ >
* OnGuardOnline < http://onguardonline.gov<http://onguardonline.gov/>/ >
* StaySafeOnline < http://www.staysafeonline.org/ncsam >
* Homeland Security's "Stop.Think.Connect." campaign < http://www.dhs.go=
v/files/events/stop-think-connect.shtm >
* StopThinkConnect < http://stopthinkconnect.org<http://stopthinkconnect=
.org/>/ >
MIT will also be doing its part. The IT Security team will post information=
on the IS&T website throughout the month. Stay tuned. If you have any sugg=
estions or questions about what can be done to raise awareness at MIT, plea=
se contact me directly at myeaton@mit.edu.
---------------------------------------------------------------------------=
-----------
2. MIT Open Wireless Networks Retiring, Switch to Secure Wireless
---------------------------------------------------------------------------=
-----------
The open wireless networks, MIT and MIT N, will be retired in January 2012 =
as part of an IT roadmap to secure the MIT network < http://web.mit.edu/itg=
c/roadmaps.html >. The other existing networks, MIT SECURE, MIT SECURE N an=
d MIT GUEST will remain in place.
With more people using Wi-Fi on the MIT campus, it's riskier to be on open =
networks. Open (unencrypted) wireless networks could allow others in the vi=
cinity to see which web sites you visit or the search terms you type into b=
rowsers. Others could even gain access to your online accounts while you br=
owse.
To mitigate these risks and for a smooth transition in January, IS&T recomm=
ends users start connecting via the secure wireless networks right away; th=
ey are encrypted and require an MIT username and password to access.
NOTE: If you have not changed your Kerberos password since June 2010, you w=
ill need to do so prior to connecting to the secure wireless network. You c=
an change your password online: < https://ca.mit.edu/ca/cpw >
Additional information and instructions are listed in this article: < http:=
//ist.mit.edu/news/open_networks_retirement >
---------------------------
3. Phishing Revisited
---------------------------
A colleague recently reminded me that what we think we know and what we do =
know about phishing might not always be the same thing. In any case, it doe=
sn't hurt to remind ourselves of the clues that indicate when an email is s=
pam attempting to extract personal information.
If you feel you need to brush up on this information, we have an article in=
the knowledge base listing the things to look for: < http://kb.mit.edu/con=
fluence/x/SBhB >
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CAB0D7D21D710myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
-webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><br></p><p style=3D"margin: 0.0=
px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this issue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. October=
is National Cyber Security Awareness Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. MIT Ope=
n Wireless Networks Retiring, Switch to Secure Wireless</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Ph=
ishing Revisited</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. October=
is National Cyber Security Awareness Month</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
------------------------------------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">It=92s tha=
t time of year again! October is National Cyber Security Awareness Month.</=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"> </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Help raise=
awareness with faculty, staff, and students in October by promoting Nation=
al Cyber Security Awareness Month (NCSAM). EDUCAUSE is one of the spon=
sors of the campaign, as many higher education institutions hold security a=
wareness events in October. If you plan on doing something around this topi=
c, please share your plans and any applicable URL=92s by sending an e-mail =
to <a href=3D"mailto:security-council@educause.edu?subject=3DNCSAM%202=
011%20Plans"><span style=3D"color: #203af9">security-council@educause.edu</=
span></a> so your activities can be included with the list of 2011 cam=
pus events.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Suggested =
resources:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">NCSAM resource kit < <a href=
=3D"https://wiki.internet2.edu/confluence/display/itsg2/NCSAM+Resource&=
#43;Kit">https://wiki.internet2.edu/confluence/display/itsg2/NCSAM+Reso=
urce+Kit</a> ></span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">NCSAM sample kit < <a href=3D=
"https://wiki.internet2.edu/confluence/display/itsg2/NCSAM+Sample+K=
it">https://wiki.internet2.edu/confluence/display/itsg2/NCSAM+Sample=
3;Kit</a> ></span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">MS-ISAC toolkit < <a href=3D"=
http://msisac.cisecurity.org/resources/toolkit">http://msisac.cisecurity.or=
g/resources/toolkit</a>/ ></span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">OnGuardOnline < <a href=3D"ht=
tp://onguardonline.gov/">http://onguardonline.gov</a>/ ></span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">StaySafeOnline < <a href=3D"h=
ttp://www.staysafeonline.org/ncsam">http://www.staysafeonline.org/ncsam</a>=
></span></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Homeland =
Security's "Stop.Think.Connect." campaign < <a href=3D"ht=
tp://www.dhs.gov/files/events/stop-think-connect.shtm"><span style=3D"color=
: #1e37ee">http://www.dhs.gov/files/events/stop-think-connect.shtm</span></=
a> ></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; color: #1=
e37ee"><span style=3D"color: #000000">StopThinkConnect < <a href=3D=
"http://stopthinkconnect.org/">http://stopthinkconnect.org</a>/ ></span>=
</li>
</ul>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Calibri; min-heig=
ht: 17.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">MIT will a=
lso be doing its part. The IT Security team will post information on the IS=
&T website throughout the month. Stay tuned. If you have any suggestion=
s or questions about what can be done to raise awareness at MIT, please con=
tact me directly at myeaton@mit.edu.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. MIT Ope=
n Wireless Networks Retiring, Switch to Secure Wireless</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------------------------------------------------------------=
-</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The open w=
ireless networks, MIT and MIT N, will be retired in January 2012 as part of=
an IT roadmap to secure the MIT network < <a href=3D"http://web.mit.edu=
/itgc/roadmaps.html"><span style=3D"text-decoration: underline ; color: #1e=
37ee">http://web.mit.edu/itgc/roadmaps.html</span></a> >. The other=
existing networks, MIT SECURE, MIT SECURE N and MIT GUEST will remain in p=
lace.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px 'Times New Roman'=
; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">With more =
people using Wi-Fi on the MIT campus, it's riskier to be on open networks. =
Open (unencrypted) wireless networks could allow others in the vicinity to =
see which web sites you visit or the search terms you type into browsers. O=
thers could even gain access to your online accounts while you browse. =
;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">To mitigat=
e these risks and for a smooth transition in January, IS&T recomme=
nds users start connecting via the secure wireless networks right away; the=
y are encrypted and require an MIT username and password to access. </=
p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">NOTE: If y=
ou have not changed your Kerberos password since June 2010, you will need t=
o do so prior to connecting to the secure wireless network. You can change =
your password online: < <a href=3D"https://ca.mit.edu/ca/cpw"><span styl=
e=3D"text-decoration: underline ; color: #1e37ee">https://ca.mit.edu/ca/cpw=
</span></a> ></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Additional=
information and instructions are listed in this article: < <a href=3D"h=
ttp://ist.mit.edu/news/open_networks_retirement"><span style=3D"text-decora=
tion: underline ; color: #1e37ee">http://ist.mit.edu/news/open_networks_ret=
irement</span></a> ></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Phishin=
g Revisited</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A colleagu=
e recently reminded me that what we think we know and what we do know about=
phishing might not always be the same thing. In any case, it doesn't hurt =
to remind ourselves of the clues that indicate when an email is spam attemp=
ting to extract personal information.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you fee=
l you need to brush up on this information, we have an article in the knowl=
edge base listing the things to look for: < <a href=3D"http://kb.mi=
t.edu/confluence/x/SBhB"><span style=3D"text-decoration: underline ; color:=
#1e37ee">http://kb.mit.edu/confluence/x/SBhB</span></a> ></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p></div><div><br></div><div><div style=3D"word-wrap: break=
-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; fon=
t-family: Helvetica; "><span class=3D"Apple-style-span" style=3D"border-col=
lapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-ver=
tical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size:=
14px; font-style: normal; font-variant: normal; font-weight: normal; lette=
r-spacing: normal; line-height: normal; -webkit-text-decorations-in-effect:=
none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: no=
ne; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bord=
er-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rg=
b(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; fo=
nt-variant: normal; font-weight: normal; letter-spacing: normal; line-heigh=
t: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -web=
kit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space: =
normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" st=
yle=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; -=
webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helv=
etica; font-size: 14px; font-style: normal; font-variant: normal; font-weig=
ht: normal; letter-spacing: normal; line-height: normal; -webkit-text-decor=
ations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; t=
ext-transform: none; orphans: 2; white-space: normal; widows: 2; word-spaci=
ng: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separ=
ate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacin=
g: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-=
style: normal; font-variant: normal; font-weight: normal; letter-spacing: n=
ormal; line-height: normal; -webkit-text-decorations-in-effect: none; text-=
indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans:=
2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"App=
le-style-span" style=3D"border-collapse: separate; -webkit-border-horizonta=
l-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: normal; -=
webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-siz=
e-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wido=
ws: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"borde=
r-collapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-borde=
r-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-=
size: 12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; -webkit-text-decorations-in-ef=
fect: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transfor=
m: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><=
span class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit=
-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; colo=
r: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: norma=
l; font-variant: normal; font-weight: normal; letter-spacing: normal; line-=
height: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px;=
-webkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-sp=
ace: normal; widows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px;=
"><br></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-sp=
an" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; ">Monique Yeaton</span></span></span></s=
pan></span></span></div><div style=3D"font-size: 12px; "><span class=3D"App=
le-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; ">IT Security Communication=
s Consultant</span></span></span></span></span></span></div><div style=3D"f=
ont-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; ">MIT Information Services & Technology (IS&T)</span></span>=
</span></span></span></span></div><div style=3D"font-size: 12px; "><span cl=
ass=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><sp=
an class=3D"Apple-style-span" style=3D"font-size: 12px; ">(617) 253-2715</s=
pan></span></span></span></span></span></div><div style=3D"font-size: 12px;=
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">http:=
//ist.mit.edu/security</span></span></span></span></span></span></div><div =
style=3D"font-size: 12px; "><br class=3D"khtml-block-placeholder"></div><br=
class=3D"Apple-interchange-newline"></span></span></span></span></span></s=
pan></span></div></div></div></div></body></html>
--_000_CAB0D7D21D710myeatonexchangemitedu_--
--===============1113591636==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1113591636==--