Announcing the STC CAC 2017-2018

CAC for the 2017-2018 program year

Core Team

  • Chair: Liz Herman
  • Vice Chair: Jessie Mallory
  • Education: Rachel Houghton
  • Communication: Ramesh Aiyyangar
  • Outreach: Lloyd Thompson-Taylor and Tavia Record
  • Advisory Members: Jackie Damrau and Ben Woelk

Volunteers 

  • Education: Steven Jong (Webinars), Roger Renteria (Adobe Connect), Tim Esposito (Websites)
  • Communication: Viqui Dill, Greta Boller
  • Outreach:
    Students: Jessie Mallory (Lead), Kiranmayee Pamarthy
    SIGs: Jamye Sagan (Lead), James Bousquet
    Chapters: Bob Young, Roheena Dhunjeebhoy

 

IDL SIG: Student Outreach Article Competition

Update: See the related webinar on November 11, 2016. 

IDL SIG Student Outreach Article Competition

Greetings!

The Instructional Design & Learning (IDL) special interest group of the Society for Technical Communication (STC) invites graduate- and undergraduate-level students to become published before graduating. Here are the basics of the program:

  • Undergraduate- or graduate-level students submit an original article to us about some aspect of instructional design. If we choose to publish it in our newsletter, IDeaL: Design for Learning, the student receives a complimentary STC student membership, which includes a membership in the IDL Special Interest Group (SIG).
  • With the student’s permission, once we publish their article we will submit it to STC’s Technical Communication Body of Knowledge (TCBOK). If the editors decide to include the student’s article in the TCBOK, he or she earns an additional year’s STC/IDL membership (or an equivalent award if they no longer qualify for student membership because they’ve graduated).
  • Once published, students can link to their article from their résumé and possibly on their LinkedIn profile page—ideally gaining an edge in becoming employed after graduation.

Go to http://www.stcidlsig.org/students/youcanbepublished/ to get the entry packet for submitting an article. Kindly do the following to inform others of this offer:

  • Share this information with your friends and acquaintances who are students or who work closely with college students.
  • Stress the deadline of December 31, 2016.

We look forward to helping students take advantage of this win-win opportunity to be published before graduating!

Sincerely,

Sylvia Miller
Student Outreach Committee Chair
IDL SIG of STC
studentoutreach@stcidlsig.org 

Attempted Fraud Advisory–Spoofed Messages from Community Leaders Requesting Funds Transfers

By Ben Woelk

The STC Rochester Treasurer received a request that appeared to come from the STC Rochester President to transfer funds to a beneficiary. The email was fraudulent and only appeared to come from the STC Rochester President email address. However, the attacker had the names of the president and treasurer correct.

Here’s the message text:

From: NAME <president@stc-rochester.org>
To: treasurer@stc-rochester.org
Cc:
Date: Mon, 11 Jul 2016 08:51:58 -0600

Subject: TRANSFER REQUEST

TREASURER NAME, I'll need you to process a transfer of 1,900USD to a vendor. Let me know if you are available so i can send you the beneficiary details immediately.

Kind Regards.
PRESIDENT NAME
Sent from my iPhone

As a security professional, I’ve seen this type of attack across many industries, but attackers are now targeting small businesses and non-profit organizations.

What Should I do to Keep Safe?

The best defense against this type of attack is having sufficient financial controls/processes in place so that someone cannot inadvertently respond and send any funds. (Note that the funds will not be recoverable.) If you don’t have processes in place to ensure that requests for funds are reviewed before being released, you need to put those processes in place now.

If you do fall victim to an attack, you should notify your local law enforcement and your financial institution. Change your email and banking passwords immediately.

If you receive an unexpected email with an attachment, verify with the sender before opening the attachment. Your antivirus program (and you need one, even if you’re using a Mac) may not detect the attachment as malicious, so you’ll need to scan your computer.

Resources

Ben Woelk, CISSP
Information Security Office Program Manager
Rochester Institute of Technology
Senior Member, Society for Technical Communication
Author of Shockproofing Your Use of Social Media: Staying Safe Online, available on Amazon Kindle.
Ben.woelk@gmail.com
@benwoelk