[8109] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, September 30, 2013
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Sep 30 15:49:08 2013
Resent-From: ist-security-fyi@MIT.EDU
From: Monique Yeaton <myeaton@MIT.EDU>
To: ist-security-fyi <ist-security-fyi@MIT.EDU>
Date: Mon, 30 Sep 2013 19:46:56 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F323EF7E9@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============0355849722=="
Errors-To: ist-security-fyi-bounces@MIT.EDU
--===============0355849722==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F323EF7E9OC11EXPO24excha_"
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F323EF7E9OC11EXPO24excha_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
In this issue:
1. EVENT: Laptop Registration, October 2nd
2. October is National Cyber Security Awareness Month
-----------------------------------------------------------
1. EVENT: Laptop Registration, October 2nd
-----------------------------------------------------------
This Wednesday, there is an opportunity to register and tag your laptop:
Where: Lobby of Building 10
When: October 2, 11:00 am - 12:30 pm
Cost: $10 cash only or MIT Cash Object
Just as you might register a bike with the police, you can also register yo=
ur laptop. Information Services & Technology partners with MIT Police to pr=
ovide STOP tags for laptops. The tag is affixed to the device, has a unique=
number, and is registered with a world-wide database.
Sgt. Cheryl Vossmer of the MIT Police says that although a STOP tag is not =
software that can track a device via GPS or other means, it has been very e=
ffective at providing a way for lost or stolen laptops to be returned to th=
eir rightful owners.
For example, a laptop that was stolen from a MIT student last year turned u=
p at a Boston homeless shelter. When one of the residents of the shelter tr=
ied to sell the laptop to another resident, a person working at the shelter=
noticed and intervened. He called the number on the STOP tag that was atta=
ched to the laptop. The owner was eventually tracked down via the MIT Polic=
e. When he got the call from the police, he was surprised; he thought the l=
aptop was gone forever.
Read more laptop recovery stories here<https://www.stoptheft.com/>.
Learn more about laptop registration at MIT<http://kb.mit.edu/confluence/di=
splay/istcontrib/MIT+Police+Laptop+Tagging+and+Registration>.
--------------------------------------------------------------------------
2. October is National Cyber Security Awareness Month
---------------------------------------------------------------------------
National Cyber Security Awareness Month (NCSAM)<http://www.staysafeonline.o=
rg/ncsam/about> is every year in October. NCSAM is a national public awaren=
ess campaign to encourage everyone to protect their computers and computing=
infrastructure.
By promoting NCSAM at MIT, we recognize that individuals, organizations, bu=
sinesses and government all share the responsibility to secure their part o=
f cyber space and the networks they use. If we all do our part =96 implemen=
ting stronger security practices, raising community awareness, educating yo=
ung people, training employees =96 we will be a more resilient and safer di=
gital society.
Learn what you can do<http://kb.mit.edu/confluence/x/WR4YCQ>.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D
Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F323EF7E9OC11EXPO24excha_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <8410D585FAB8904E9CBED253060F1907@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. EVENT: Laptop Registr=
ation, October 2nd</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. October is National C=
yber Security Awareness Month</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-----------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. EVENT: Laptop Registr=
ation, October 2nd</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-----------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">This Wednesday, there is=
an opportunity to register and tag your laptop:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Where: Lobby of Building=
10</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">When: October 2, 11:00 a=
m - 12:30 pm</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Cost: $10 cash only or M=
IT Cash Object</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Just as you might regist=
er a bike with the police, you can also register your laptop. Information S=
ervices & Technology partners with MIT Police to provide STOP tags for =
laptops. The tag is affixed to the device,
has a unique number, and is registered with a world-wide database.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Sgt. Cheryl Vossmer of t=
he MIT Police says that although a STOP tag is not software that can track =
a device via GPS or other means, it has been very effective at providing a =
way for lost or stolen laptops to
be returned to their rightful owners.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">For example, a laptop th=
at was stolen from a MIT student last year turned up at a Boston homeless s=
helter. When one of the residents of the shelter tried to sell the laptop t=
o another resident, a person working
at the shelter noticed and intervened. He called the number on the STOP ta=
g that was attached to the laptop. The owner was eventually tracked down vi=
a the MIT Police. When he got the call from the police, he was surprised; h=
e thought the laptop was gone forever.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"color: #000000">Read more
<a href=3D"https://www.stoptheft.com/">laptop recovery stories here</a>.</s=
pan></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); ">=
<span style=3D"text-decoration: underline"><a href=3D"http://kb.mit.edu/con=
fluence/display/istcontrib/MIT+Police+Laptop+Tagging+and=
3;Registration">Learn more about laptop registration at MIT</a></span><span=
style=3D"color: #000000">.</span></p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
--------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. October is National C=
yber Security Awareness Month</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------------------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"http://www.st=
aysafeonline.org/ncsam/about">National Cyber Security Awareness Month (NCSA=
M)</a> is every year in October. NCSAM is a national public awareness =
campaign to encourage everyone to protect
their computers and computing infrastructure.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">By promoting NCSAM at MI=
T, we recognize that individuals, organizations, businesses and government =
all share the responsibility to secure their part of cyber space and the ne=
tworks they use. If we all do our
part =96 implementing stronger security practices, raising community aware=
ness, educating young people, training employees =96 we will be a more resi=
lient and safer digital society.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "> =
</p>
<p style=3D"margin: 0px; font-family: Helvetica; "><a href=3D"http://kb.mit=
.edu/confluence/x/WR4YCQ">Learn what you can do</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "></p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"margin: 0px; font-family: Arial; ">Read all Security FYI Newsle=
tter articles and submit comments online at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<div><br>
</div>
<p></p>
</div>
<div><span class=3D"Apple-style-span" style=3D"border-collapse: separate; f=
ont-family: Calibri; font-size: medium; border-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px; font-family: Helvetica; font-size: 14px; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
separate; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; border-spacing: 0px; "><span c=
lass=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacin=
g: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; border-spacing: 0px; font-size: 12px; ">
<div><br>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services & Technology (IS&T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>
--_000_3ACED3B2A8CEFB4598A845F07FD4A05F323EF7E9OC11EXPO24excha_--
--===============0355849722==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============0355849722==--