<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
</head>
<body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-family: Garamond, sans-serif; ">
<div>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; ">In this issue:</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">1. EVENT: Laptop Registration, October 2nd</p>
<p style="margin: 0px; font-family: Helvetica; ">2. October is National Cyber Security Awareness Month</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">-----------------------------------------------------------</p>
<p style="margin: 0px; font-family: Helvetica; ">1. EVENT: Laptop Registration, October 2nd</p>
<p style="margin: 0px; font-family: Helvetica; ">-----------------------------------------------------------</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">This Wednesday, there is an opportunity to register and tag your laptop:</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">Where: Lobby of Building 10</p>
<p style="margin: 0px; font-family: Helvetica; ">When: October 2, 11:00 am - 12:30 pm</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">Cost: $10 cash only or MIT Cash Object</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">Just as you might register a bike with the police, you can also register your laptop. Information Services & Technology partners with MIT Police to provide STOP tags for laptops. The tag is affixed to the device,
has a unique number, and is registered with a world-wide database.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">Sgt. Cheryl Vossmer of the MIT Police says that although a STOP tag is not software that can track a device via GPS or other means, it has been very effective at providing a way for lost or stolen laptops to
be returned to their rightful owners.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">For example, a laptop that was stolen from a MIT student last year turned up at a Boston homeless shelter. When one of the residents of the shelter tried to sell the laptop to another resident, a person working
at the shelter noticed and intervened. He called the number on the STOP tag that was attached to the laptop. The owner was eventually tracked down via the MIT Police. When he got the call from the police, he was surprised; he thought the laptop was gone forever.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); "><span style="color: #000000">Read more
<a href="https://www.stoptheft.com/">laptop recovery stories here</a>.</span></p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; color: rgb(4, 46, 238); "><span style="text-decoration: underline"><a href="http://kb.mit.edu/confluence/display/istcontrib/MIT+Police+Laptop+Tagging+and+Registration">Learn more about laptop registration at MIT</a></span><span style="color: #000000">.</span></p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">--------------------------------------------------------------------------</p>
<p style="margin: 0px; font-family: Helvetica; ">2. October is National Cyber Security Awareness Month</p>
<p style="margin: 0px; font-family: Helvetica; ">---------------------------------------------------------------------------</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; "><a href="http://www.staysafeonline.org/ncsam/about">National Cyber Security Awareness Month (NCSAM)</a> is every year in October. NCSAM is a national public awareness campaign to encourage everyone to protect
their computers and computing infrastructure.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; ">By promoting NCSAM at MIT, we recognize that individuals, organizations, businesses and government all share the responsibility to secure their part of cyber space and the networks they use. If we all do our
part – implementing stronger security practices, raising community awareness, educating young people, training employees – we will be a more resilient and safer digital society.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "> </p>
<p style="margin: 0px; font-family: Helvetica; "><a href="http://kb.mit.edu/confluence/x/WR4YCQ">Learn what you can do</a>.</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style="margin: 0px; font-family: Helvetica; min-height: 17px; "></p>
<p style="margin: 0px; font-family: Arial; ">===================================================================================</p>
<p style="margin: 0px; font-family: Arial; ">Read all Security FYI Newsletter articles and submit comments online at
<a href="http://securityfyi.wordpress.com/">http://securityfyi.wordpress.com/</a>.</p>
<p style="margin: 0px; font-family: Arial; ">===================================================================================</p>
<div><br>
</div>
<p></p>
</div>
<div><span class="Apple-style-span" style="border-collapse: separate; font-family: Calibri; font-size: medium; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; font-family: Helvetica; font-size: 14px; ">
<div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">
<span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; "><span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px; font-size: 12px; ">
<div><br>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services & Technology (IS&T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class="khtml-block-placeholder">
</div>
<br class="Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>