Update: See the related webinar on November 11, 2016.
The Instructional Design & Learning (IDL) special interest group of the Society for Technical Communication (STC) invites graduate- and undergraduate-level students to become published before graduating. Here are the basics of the program:
- Undergraduate- or graduate-level students submit an original article to us about some aspect of instructional design. If we choose to publish it in our newsletter, IDeaL: Design for Learning, the student receives a complimentary STC student membership, which includes a membership in the IDL Special Interest Group (SIG).
- With the student’s permission, once we publish their article we will submit it to STC’s Technical Communication Body of Knowledge (TCBOK). If the editors decide to include the student’s article in the TCBOK, he or she earns an additional year’s STC/IDL membership (or an equivalent award if they no longer qualify for student membership because they’ve graduated).
- Once published, students can link to their article from their résumé and possibly on their LinkedIn profile page—ideally gaining an edge in becoming employed after graduation.
Go to http://www.stcidlsig.org/students/youcanbepublished/ to get the entry packet for submitting an article. Kindly do the following to inform others of this offer:
- Share this information with your friends and acquaintances who are students or who work closely with college students.
- Stress the deadline of December 31, 2016.
We look forward to helping students take advantage of this win-win opportunity to be published before graduating!
Student Outreach Committee Chair
IDL SIG of STC
By Ben Woelk
The STC Rochester Treasurer received a request that appeared to come from the STC Rochester President to transfer funds to a beneficiary. The email was fraudulent and only appeared to come from the STC Rochester President email address. However, the attacker had the names of the president and treasurer correct.
Here’s the message text:
From: NAME <firstname.lastname@example.org>
Date: Mon, 11 Jul 2016 08:51:58 -0600
Subject: TRANSFER REQUEST
TREASURER NAME, I'll need you to process a transfer of 1,900USD to a vendor. Let me know if you are available so i can send you the beneficiary details immediately.
Sent from my iPhone
As a security professional, I’ve seen this type of attack across many industries, but attackers are now targeting small businesses and non-profit organizations.
What Should I do to Keep Safe?
The best defense against this type of attack is having sufficient financial controls/processes in place so that someone cannot inadvertently respond and send any funds. (Note that the funds will not be recoverable.) If you don’t have processes in place to ensure that requests for funds are reviewed before being released, you need to put those processes in place now.
If you do fall victim to an attack, you should notify your local law enforcement and your financial institution. Change your email and banking passwords immediately.
If you receive an unexpected email with an attachment, verify with the sender before opening the attachment. Your antivirus program (and you need one, even if you’re using a Mac) may not detect the attachment as malicious, so you’ll need to scan your computer.
Ben Woelk, CISSP
Information Security Office Program Manager
Rochester Institute of Technology
Senior Member, Society for Technical Communication
Author of Shockproofing Your Use of Social Media: Staying Safe Online, available on Amazon Kindle.
The STC CAC invites all leaders past, present and future to join us for a morning of connecting and learning. Please join us for the #STC16 Leadership Program on Sunday May 15, 2016 from 8:00 am – 12:30 pm PDT at the Anaheim Marriott Platinum 3 & 4.
The program handout is now available in pdf format. STC16 Leadership Program Trifold
See more about the event on the STC Summit schedule.