This year marks the 11th anniversary of National Cyber Security Awareness Month (NCSAM). NCSAM is observed throughout the month of October to increase the awareness of cyber security threats and techniques to safeguard against them.

As a NCSAM Champion, Wentworth will be providing frequent tips and articles throughout October on how you can better protect your data and computing devices from security threats such as malware, phishing emails, and identity theft. Throughout October, the Information Security Office we will share an article that is relevant to you. Topics will range from recognizing a “phishing” email to best practices for protecting your privacy on social networking sites. In addition, we will be launching the Information Security & Compliance Training Program available to all staff and faculty. Finally, we would like to take this show on the road with presentations on cyber security threats, data privacy, and information security best practices. If you would like to have Wentworth’s Information Security Officer come to your department or group, please email to schedule a presentation.

Follow us on Twitter @InfoSec_WIT for more on NCSAM, security news, and resources for improving your information security practices.


Fall Projects – 2014

John Knights —  September 5, 2014 — Leave a comment

The Information Security Office (ISO) will be working with others within Technology Services and across Wentworth to continue our efforts to improve the information security posture. Below are a couple of initiatives and projects we will be working on this Fall.

National Cyber Security Awareness Month

October is the 11th Annual NCSAM. As a NCSAM Champion, we will be providing cyber security awareness materials throughout the month to our entire community via Twitter, the Information Security Blog, and ISO website.

In conjunction with NCSAM, we will be launching the Information Security & Compliance Training Program for staff and faculty.

Identity & Access Management

This fall, we will launch a multi-year project to improve the overall approach to identity and access management. The IAM project will both increase the protection of institutional data and information systems and improve the overall end-user experience when logging into the various systems and services available to the Wentworth community.

For more information on these and other initiatives, make sure to visit our ISO website.

Summer Projects – 2014

John Knights —  September 5, 2014 — Leave a comment

Along with the rest of Technology Services, the Information Security Office (ISO) has been busy working on projects to improve the overall information security posture at Wentworth. As we start the new academic year, we want to share some of what we have been working on.

Data Management

Over the course of the summer, members of the Information Security Compliance Committee (ISCC) have worked to put together a set of policy documents to set the requirements for improving data governance and security. Once approved these policies we will send out a notice as well as publish them on the Technology Services Policy Page.

In addition to the policies, the ISO has worked with other members from Technology Services to provide all staff and faculty with a data loss prevention tool, Identity Finder. This tool is available to all staff and faculty for use on their institutional Windows or Mac-based desktops and laptops. For more information, please visit our Data Loss Prevention “Top Topics” page or go straight to the Identity Finder Tool page for instructions on obtaining, installing and using Identity Finder.

Information Security Awareness & Compliance Training Program

In an effort to improve awareness of information security and regulatory compliance requirements, we have worked with the ISCC and our training video service provider WeComply to provide our staff and faculty with a set of comprehensive educational videos on various topics (Information Security, Data Privacy, FERPA, and others). Visit the ISO’s Training page for more information on the program launching this October.


Over the last few months, a frequently referenced site caught the attention of many security professionals as it provides an interesting visualization of the cyber attacks that traverse the globe every second of every day. The site is a map put together by Nosre Corp.

Norse Corp provides cyber security appliances and services that aim help organizations block attacks. One interesting use of all the intelligence they collect from their devices is the Norse live attack map, which they state is “a visualization of a tiny portion (<1%) of the data” they process every day. Take a look at the Norse Live Threat Map.

Norse's Live Threat Map - 10:40a on 9-5-14

WARNING: The Live Threat Map is an interesting application and can quite entrancing!

New studies have found that 1/3 of all phishing attempts last year went after bank accounts or other financial information directly.  From 2012 this is an increase of 8.5% in financial attacks, an all-time high for phishing.  Most of these financial scams pose as a popular organization, and even worse, about half of them use either PayPal, MasterCard, Visa, or American Express’s name to seem legitimate.  Phishing attacks damage these brands reputations and make it harder for the average internet user to distinguish between real emails and scams.  Amazon is also used as a cover in most phishing attacks to fool the receiver, with Apple and E-Bay also being used.

In addition to these, recent phishing attempts have tried to exploit conference attendees by posing as hotels or travel agencies representing the conference organizers. Follow the links and instructions provided on the conference websites for searching hotels and making reservations.

Never trust unsolicited emails or calls for sensitive information. Always be skeptical and cautious when being asked to reply to emails or follow to linked forms that request sensitive information (financial account numbers, credit card numbers, usernames and passwords) because it may be a phishing attempt.  Review our phishing page to help identify malicious communications and forward suspicious emails to before opening any links or giving any information.  It is also important to remember that phishing is not restricted to email, at least a third of phishing attacks last year were deployed via Facebook.  Be aware at all times online especially when handling sensitive information.

Anti-virus software has changed a lot over the past decade, moving from virus scans triggered by a user to comprehensive malware detection in real time.  While an often lengthy scan was once your only option to detect threats, protection is becoming more automated, now happening as soon as you encounter malware or other malicious programs.  The next step in protecting our computers is a breach detection system (or BDS) that can detect any breach in a network of computers and then contain or remediate all the damage within 48 hours.

Current anti-virus software uses signature-based detection to match a current list of threats to the findings of a search or a software that is currently affecting the computer.  Users must keep their anti-virus software updated consistently to combat the latest threats on the internet.  Another big problem right now with anti-virus software is how predictable it is.  The signature based system allows hackers to test their virus on a system with existing software available to the public before a large scale attack.  With a proper breach detection system, any attack will be discovered because detection is not just based on pre-determined signatures, but on reacting to signs of an attack through network traffic analysis and server data.  Ideally, a BDS will stop a threat coming from inside the network, from the cloud, or even on an employee’s mobile phone.  It will then remediate the damage by quarantine, session termination, and other restrictions.

Breach detection systems help keep entire networks secure and more connected.  The Wentworth Technology Services Information Security Office is always looking for better ways to protect the institute and it’s members, broadening our scope protection services will help us with this mission. We employ next generation firewalls to perform these more advanced techniques for malware detection. In addition, there are active and proposed projects for expanding our tools and techniques to improve the security and privacy of your institutional data, feel free to periodically check in on our projects page for more information and status checks on our projects.

As the semester comes to a close , it is important to remember some of the tips we’ve shared over the semester.  Among them are the information security and privacy techniques vital for protecting your sensitive information online.  From choosing the correct Wi-Fi network to staying alert for phishing emails while off-campus, here are the things you need to keep in mind to have a fun and safe summer.

  • Avoid unsecured Wi-Fi and use secured Wi-Fi networks or connect with an Ethernet cable
    • Especially when checking financial or sensitive information on your laptop.
    • An unsecured Wi-Fi network could be a fake proxy or a real network simply compromised by a hacker, who is watching everyone’s activity.
    • Turn sharing settings off if you have to use an unsecured connection
  • Review the signs of a phishing email here
    • Not addressed to you; vague wording
    • Misspelled words or illogical statements
    • Requesting information randomly or urgently
    • Suspicious URL links
  • Stay safe on social networks
    • Restrict your privacy settings so only your friends can see your information
    • Be cautious if your information is requested in any way
    • Know where your information is going to and who can see it
  • Change your password now and stay one step ahead
    • Passwords have to be changed every 180 days
    • Make the fall transition easier by changing your password now
    • Check requirements and change password here
  • Use a virtual private network to work from home and stay secured
    • For Wentworth employees that require VPN access to the campus network when working remotely, please email our Information Security Office to find out more.

The next time you post something on Facebook that anyone can see, you will be greeted by a small blue blast from the past.  A tiny blue dinosaur (article and example from Sophos) now reminds users without privacy settings enabled to read and understand them better before they share information online.  The dino addresses the user by name and hopefully will encourage more people to be safer online.  This is a much needed step towards privacy and transparency for the social network giant.

The cartoon popup is just a test program but is already receiving great feedback and hopefully it will spur more companies to follow suit by making their user’s privacy a bigger priority.  The exact message you will receive is: “You haven’t changed who can see your posts lately, so we just wanted to make sure you’re sharing this post with the right audience. (Your current setting is Public, though you can change this whenever you post.)”. It then gives you different options to limit who can see your post.


The Heartbleed Bug

John Knights —  April 11, 2014 — Leave a comment

What is the Heartbleed Bug

The Heartbleed Bug is a vulnerability that was discovered on April 7th in the code that some servers and websites us for secure communication. The vulnerability directly affects any security connections that utilize OpenSSL. OpenSSL is a mechanism used by some web sites, web service, and servers to establish secure communications between you and the server.

Why does this matter?

If you have connected to a web site or service that has used the vulnerable version of OpenSSL over the last 2 years, there is the potential that the security of that connection was compromised. This is a wide-spread vulnerability as many sites and services use OpenSSL.

What is Wentworth doing?

After this vulnerability was made public, Wentworth Technology Services began running tests against all internet-facing web servers to test for the presence of this vulnerability. None have been discovered as the majority of the servers utilized by the Institute do not utilize OpenSSL. We are continuing our investigation to ensure that all internal servers as well as those used for our externally-hosted services are free of this vulnerability. For any vulnerable server that we find, we will address through applying updates and patches. We will continue to keep you posted through our Information Security website at, our security blog at, and via Twitter @InfoSec_WIT.

What should you do?

First of all, don’t panic. This vulnerability and how to address it is well known throughout the security community and most sites that are potentially affected by this bug are in the process of fixing or have already done so. A complete list of affected sites is not known. What we encourage you to do is check with the sites that you have a password for. Most sites will have a link or prominent notice indicating what they are doing to address this bug.

Below are some practices we suggest you follow to keep yourself safe:

  • Wait to perform any online banking or transactions with online retailers until they indicate it is safe to do so. After a notice has been posted or emailed to you, reset your password with that site.
  • Reset passwords directly at the site. Be suspicious of any emails you receive requesting you to click on a link that takes you to a password reset page. Although many of them will be legitimate, there is the possibility that it could be a phishing email. Instead of clicking the link, copy and paste the link on the address bar on your browser or go directly to the site and look for their password reset page. (For Wentworth, we encourage users to always go directly to the password reset page that can be accessed through the Information Security site’s home page at the link above.)
  • DO NOT reply to any emails asking for sensitive information, regardless of how legitimate it looks. No reputable site or company should ever ask you to email any sensitive information via email (such as ssn, credit card numbers, or passwords).
  • If you suspect you are receiving any illegitimate emails, please forward them to

For any questions, please contact the Technology Service Help Desk at 617-989-4984 or via email at

For more information on the Heartbleed bug, visit, posted by the researchers that discovered the vulnerability.


It is the Information Security Office’s goal to keep the Institute’s data and information systems as secure and safe as possible when online. We want students, staff, faculty, and Wentworth guests to feel comfortable connecting to our networks. One way we are working to improve our network’s security is through the implementation of Network Access Control (NAC) devices to ensure only students, staff, faculty, and Wentworth guests are utilizing our network resources. This will optimize our network for the community and maintain a dynamic inventory of all devices connected at all times. The aim is to improve our visibility and monitoring capabilities to improve our network security initiatives, as well as satisfying State and Federal regulations requirements for us to do so.

The implementation should be rather transparent to individuals that connect to LeopardSecure, as the only change is the addition of the appliances which work in the background. The only anticipated and expected noticeable aspect of this implementation will involve the individuals connecting to LeopardGuest.

For individuals connecting to the LeopardGuest wireless network, which is made available to guests visiting the Wentworth campus, there will now be a Guest Registration Page. What that will look like and how it will work will be posted on the NAC project page.

The Guest Registration page will only ask for an individual’s name, email, and phone number. Once the registration is complete, all a user will be required to do is enter the numbers provided through a text message (SMS message) to complete the registration and validate their device for use on the network.

If you have any questions about this project, how we plan to roll it out, or just about NACs in general, please reach out to us via email at