[2406] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, October 24, 2011
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Oct 24 13:59:24 2011
From: Monique Yeaton <myeaton@mit.edu>
To: "ist-security-fyi@mit.edu" <ist-security-fyi@mit.edu>
Date: Mon, 24 Oct 2011 13:57:39 -0400
Message-ID: <CACB1F53.1E548%myeaton@exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Cc: "itss@mit.edu" <itss@mit.edu>
Content-Type: multipart/mixed; boundary="===============0814236554=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============0814236554==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_CACB1F531E548myeatonexchangemitedu_"
--_000_CACB1F531E548myeatonexchangemitedu_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. STOP Tagging at MIT
2. Cyber Security Pledge Campaign
3. Which AV Product is Better?
-------------------------------
1. STOP Tagging at MIT
-------------------------------
STOP tags<http://www.stoptheft.com/site/index.php> are a theft deterrent de=
vice<http://ist.mit.edu/security/loss/deterrents> and can help to return st=
olen laptops or other mobile devices to their owner.
At MIT, STOP tagging and registration is offered by the MIT Police Crime Pr=
evention Unit. The unit has been working in collaboration with IS&T to make=
members of the MIT community aware of this service and to provide times an=
d locations.
The service requires a $10 fee, paid in cash, or using an MIT cost object c=
ode. Bring your laptop or item to be tagged.
As Sgt. Cheryl Vossmer of the MIT Police has told me, the device is not fai=
l-safe, but can make an item less attractive for thieves and be an aid for =
returning stolen items. Last week a laptop with a STOP tag attached was sto=
len off campus and was later found in some bushes off campus. A good samari=
tan called the STOP phone number on the tag, and before the owner knew the =
laptop was stolen, he was informed that it was found.
If you or someone you know can benefit from this service, please pass on th=
e following upcoming opportunities:
Wed. 10/26
12:00 - 2:00 pm @ Maseeh Hall
Wed. 11/9
11:30 am - 1:00 pm @ E17, IS&T
Wed. 12/14
11:30 am - 1:00 pm @ E17, IS&T
The full list of scheduled dates<http://kb.mit.edu/confluence/x/e4CSAw> is =
posted in Hermes.
---------------------------------------------
2. Cyber Security Pledge Campaign
---------------------------------------------
In keeping with tradition at both the federal and state level, Governor Pat=
rick has again proclaimed October as Cyber Security Awareness Month.
All Massachusetts citizens are invited to declare their commitment to using=
good practices for staying safe on the Internet by taking the Cyber Securi=
ty Pledge<http://msisac.cisecurity.org/cyber-pledge>.
The pledge campaign =96 hailed as a friendly competition between states =96=
has been launched by the Multi State Information and Analysis Center (MS-I=
SAC) to raise awareness of cyber security best practices.
The pledge outlines key behaviors that computer users should take to protec=
t themselves and their information, both at home and in the workplace. The =
pledge also encourages us to take action by spreading the message of good c=
yber security practices to friends, co-workers, neighbors, and communities.=
The pledge contest runs through October 31 and is one of the many activiti=
es underway in recognition of October as National Cyber Security Awareness =
Month<http://msisac.cisecurity.org/resources/toolkit/>.
---------------------------------------
3. Which AV Product is Better?
---------------------------------------
The question about which AV (anti-virus) software to use comes up all the t=
ime. To date, it has been tricky answering this question to anyone's satisf=
action. The software provided by MIT, McAfee VirusScan (or McAfee Security =
for Macs), does a pretty good job of keeping the most dangerous of viruses =
off your system, but it falls short when it comes to spyware protection.
A recent survey and comparison report by PC Magazine<http://www.pcantivirus=
reviews.com/antivirus-comparison.html> doesn't even list McAfee in the top =
five AV products. At the top of the list are products by Vipre, BitDefender=
, Kaspersky, AVG and Avast. Their cost is on average $40.
However, for many of us, having a free product is appealing. McAfee is a fr=
ee download<http://ist.mit.edu/services/software/available-software?field_s=
oft_app_type_value_many_to_one=3Dantivirus&field_platform_value_many_to_one=
=3DAll&field_mit_status_value_many_to_one_1=3DAll> for the MIT community an=
d it's better than using nothing. Another option, if you run a Windows mach=
ine, is to use the free products by Microsoft: Microsoft Security Essential=
s, Windows Defender and Microsoft Safety Scanner. Will these do as good a j=
ob?
The answer, again, is tricky. In the end, experiences may vary and depend o=
n many different factors: The operating system and whether it has the lates=
t updates, the use of protective measures built into the browser one uses, =
whether ports are open or closed and can limit incoming traffic to the comp=
uter, whether spam is caught before reaching one's inbox, and how AV produc=
t settings are configured (which areas it will scan, how often, how often v=
irus definitions are updated, etc).
User behavior can also be a factor. If you use the computer primarily for r=
esponsible work-related purposes, you are more likely to avoid dangerous vi=
ruses on the Internet, than if you use it for personal use or click on ever=
ything and anything.
My suggestion is to buy the best AV product you can afford or take a risk w=
ith a free one. But remember, as with anything in this world, you get what =
you pay for. And do your homework to find the one that best suits your situ=
ation.
For next time: An article comparing and contrasting McAfee VirusScan to the=
Microsoft products mentioned above and other commonly used AV products.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_CACB1F531E548myeatonexchangemitedu_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
<html><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252"></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space;=
-webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14p=
x; font-family: Calibri, sans-serif; "><div><div><div><p style=3D"margin: 0=
.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In this is=
sue:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. STOP Ta=
gging at MIT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
ecurity Pledge Campaign</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Which A=
V Product is Better?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">1. STOP Ta=
gging at MIT</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
---------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"http://www.stoptheft.com/site/index.php">STOP tags</a> are a <a href=3D"ht=
tp://ist.mit.edu/security/loss/deterrents">theft deterrent device</a> and c=
an help to return stolen laptops or other mobile devices to their owner.&nb=
sp;</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">At MIT, ST=
OP tagging and registration is offered by the MIT Police Crime Prevention U=
nit. The unit has been working in collaboration with IS&T to make membe=
rs of the MIT community aware of this service and to provide times and loca=
tions.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The servic=
e requires a $10 fee, paid in cash, or using an MIT cost object code. Bring=
your laptop or item to be tagged.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">As Sgt. Ch=
eryl Vossmer of the MIT Police has told me, the device is not fail-safe, bu=
t can make an item less attractive for thieves and be an aid for returning =
stolen items. Last week a laptop with a STOP tag attached was stolen off ca=
mpus and was later found in some bushes off campus. A good samaritan called=
the STOP phone number on the tag, and before the owner knew the laptop was=
stolen, he was informed that it was found.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">If you or =
someone you know can benefit from this service, please pass on the followin=
g upcoming opportunities:</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Wed. 10/26=
</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">12:00 - 2:=
00 pm @ Maseeh Hall</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Wed. 11/9 =
<span style=3D"font: 14.0px 'Lucida Grande'"><br>
</span>11:30 am - 1:00 pm @ E17, IS&T</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Wed. 12/14=
<span style=3D"font: 14.0px 'Lucida Grande'"><br>
</span>11:30 am - 1:00 pm @ E17, IS&T</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial"><a href=3D=
"http://kb.mit.edu/confluence/x/e4CSAw">The full list of scheduled dates</a=
> is posted in Hermes.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">2. Cyber S=
ecurity Pledge Campaign</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">In keeping=
with tradition at both the federal and state level, Governor Patrick has a=
gain proclaimed October as Cyber Security Awareness Month. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">All Massac=
husetts citizens are invited to declare their commitment to using good prac=
tices for staying safe on the Internet by <a href=3D"http://msisac.cisecuri=
ty.org/cyber-pledge">taking the Cyber Security Pledge</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The pledge=
campaign =96 hailed as a friendly competition between states =96 has been =
launched by the Multi State Information and Analysis Center (MS-ISAC) to ra=
ise awareness of cyber security best practices. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The pledge=
outlines key behaviors that computer users should take to protect themselv=
es and their information, both at home and in the workplace. The pledge als=
o encourages us to take action by spreading the message of good cyber secur=
ity practices to friends, co-workers, neighbors, and communities. The pledg=
e contest runs through October 31 and is one of the many activities underwa=
y in recognition of October as <a href=3D"http://msisac.cisecurity.org/reso=
urces/toolkit/">National Cyber Security Awareness Month</a>.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">3. Which A=
V Product is Better?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">----------=
-----------------------------</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The questi=
on about which AV (anti-virus) software to use comes up all the time. To da=
te, it has been tricky answering this question to anyone's satisfaction. Th=
e software provided by MIT, McAfee VirusScan (or McAfee Security for Macs),=
does a pretty good job of keeping the most dangerous of viruses off your s=
ystem, but it falls short when it comes to spyware protection. </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">A recent s=
urvey and comparison <a href=3D"http://www.pcantivirusreviews.com/antivirus=
-comparison.html">report by PC Magazine</a> doesn't even list McAfee in the=
top five AV products. At the top of the list are products by Vipre, BitDef=
ender, Kaspersky, AVG and Avast. Their cost is on average $40.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">However, f=
or many of us, having a free product is appealing. McAfee is a <a href=3D"h=
ttp://ist.mit.edu/services/software/available-software?field_soft_app_type_=
value_many_to_one=3Dantivirus&field_platform_value_many_to_one=3DAll&am=
p;field_mit_status_value_many_to_one_1=3DAll">free download</a> for the MIT=
community and it's better than using nothing. Another option, if you run a=
Windows machine, is to use the free products by Microsoft: Microsoft Secur=
ity Essentials, Windows Defender and Microsoft Safety Scanner. Will these d=
o as good a job?</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">The answer=
, again, is tricky. In the end, experiences may vary and depend on many dif=
ferent factors: The operating system and whether it has the latest updates,=
the use of protective measures built into the browser one uses, whether po=
rts are open or closed and can limit incoming traffic to the computer, whet=
her spam is caught before reaching one's inbox, and how AV product settings=
are configured (which areas it will scan, how often, how often virus defin=
itions are updated, etc). </p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">User behav=
ior can also be a factor. If you use the computer primarily for responsible=
work-related purposes, you are more likely to avoid dangerous viruses on t=
he Internet, than if you use it for personal use or click on everything and=
anything.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">My suggest=
ion is to buy the best AV product you can afford or take a risk with a free=
one. But remember, as with anything in this world, you get what you pay fo=
r. And do your homework to find the one that best suits your situation.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">For next t=
ime: An article comparing and contrasting McAfee VirusScan to the Microsoft=
products mentioned above and other commonly used AV products.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Read all S=
ecurity FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D</p>
<p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; min-height=
: 16.0px"><br></p></div><div><div style=3D"word-wrap: break-word; -webkit-n=
bsp-mode: space; -webkit-line-break: after-white-space; font-family: Helvet=
ica; "><span class=3D"Apple-style-span" style=3D"border-collapse: separate;=
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0=
px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-styl=
e: normal; font-variant: normal; font-weight: normal; letter-spacing: norma=
l; line-height: normal; -webkit-text-decorations-in-effect: none; text-inde=
nt: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-s=
tyle-span" style=3D"border-collapse: separate; -webkit-border-horizontal-sp=
acing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font=
-family: Helvetica; font-size: 14px; font-style: normal; font-variant: norm=
al; font-weight: normal; letter-spacing: normal; line-height: normal; -webk=
it-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-size-ad=
just: auto; text-transform: none; orphans: 2; white-space: normal; widows: =
2; word-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-co=
llapse: separate; -webkit-border-horizontal-spacing: 0px; -webkit-border-ve=
rtical-spacing: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size=
: 14px; font-style: normal; font-variant: normal; font-weight: normal; lett=
er-spacing: normal; line-height: normal; -webkit-text-decorations-in-effect=
: none; text-indent: 0px; -webkit-text-size-adjust: auto; text-transform: n=
one; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span=
class=3D"Apple-style-span" style=3D"border-collapse: separate; -webkit-bor=
der-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: r=
gb(0, 0, 0); font-family: Helvetica; font-size: 14px; font-style: normal; f=
ont-variant: normal; font-weight: normal; letter-spacing: normal; line-heig=
ht: normal; -webkit-text-decorations-in-effect: none; text-indent: 0px; -we=
bkit-text-size-adjust: auto; text-transform: none; orphans: 2; white-space:=
normal; widows: 2; word-spacing: 0px; "><span class=3D"Apple-style-span" s=
tyle=3D"border-collapse: separate; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0); font-family: Hel=
vetica; font-size: 14px; font-style: normal; font-variant: normal; font-wei=
ght: normal; letter-spacing: normal; line-height: normal; -webkit-text-deco=
rations-in-effect: none; text-indent: 0px; -webkit-text-size-adjust: auto; =
text-transform: none; orphans: 2; white-space: normal; widows: 2; word-spac=
ing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: sepa=
rate; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spaci=
ng: 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font=
-style: normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; -webkit-text-decorations-in-effect: none; text=
-indent: 0px; -webkit-text-size-adjust: auto; text-transform: none; orphans=
: 2; white-space: normal; widows: 2; word-spacing: 0px; "><span class=3D"Ap=
ple-style-span" style=3D"border-collapse: separate; -webkit-border-horizont=
al-spacing: 0px; -webkit-border-vertical-spacing: 0px; color: rgb(0, 0, 0);=
font-family: Helvetica; font-size: 12px; font-style: normal; font-variant:=
normal; font-weight: normal; letter-spacing: normal; line-height: normal; =
-webkit-text-decorations-in-effect: none; text-indent: 0px; -webkit-text-si=
ze-adjust: auto; text-transform: none; orphans: 2; white-space: normal; wid=
ows: 2; word-spacing: 0px; "><div style=3D"font-size: 12px; "><br></div><di=
v style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"fon=
t-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; =
"><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; ">Monique Yeaton</span></span></span></span></span></s=
pan></div><div style=3D"font-size: 12px; "><span class=3D"Apple-style-span"=
style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font=
-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "=
><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; ">IT Security Communications Consultant</=
span></span></span></span></span></span></div><div style=3D"font-size: 12px=
; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span clas=
s=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-sty=
le-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; ">MIT I=
nformation Services & Technology (IS&T)</span></span></span></span>=
</span></span></div><div style=3D"font-size: 12px; "><span class=3D"Apple-s=
tyle-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" sty=
le=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-siz=
e: 12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><sp=
an class=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Ap=
ple-style-span" style=3D"font-size: 12px; ">(617) 253-2715</span></span></s=
pan></span></span></span></div><div style=3D"font-size: 12px; "><span class=
=3D"Apple-style-span" style=3D"font-size: 12px; "><span class=3D"Apple-styl=
e-span" style=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=
=3D"font-size: 12px; "><span class=3D"Apple-style-span" style=3D"font-size:=
12px; "><span class=3D"Apple-style-span" style=3D"font-size: 12px; "><span=
class=3D"Apple-style-span" style=3D"font-size: 12px; ">http://ist.mit.edu/=
security</span></span></span></span></span></span></div><div style=3D"font-=
size: 12px; "><br class=3D"khtml-block-placeholder"></div><br class=3D"Appl=
e-interchange-newline"></span></span></span></span></span></span></span></d=
iv></div></div></div></body></html>
--_000_CACB1F531E548myeatonexchangemitedu_--
--===============0814236554==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0814236554==--