Today at Berkeley Lab

Cyber Security: Important Apple OSX Patch Released

As widely reported, a critical vulnerability was found in Apple OSX High Sierra on Nov 28. Apple has released a patch for the vulnerability, and it is important that you apply this patch to protect your computer and data. More details, including instructions on how to patch, can be found here.

You can leave a comment. View the Comment Policy.

SC 17 Report: Lab’s Soledad Toledano Gets Up to Speed on Networking

When Soledad Toledano of the IT Division’s computer security team learned that she would be attending the SC17 conference under the WINS program (Women in IT Networking at SC), she hoped to learn more about networking. Within a week she’s been immersed in bits, taps, and black hole IPs. More>

You can leave a comment. View the Comment Policy.

Old, New, Digital or Print, Lab Librarians Can Likely Find It With Just a Hint

Michael Golden and Peter Palath help employees navigate access to online scientific publications, maintain a collection of hard-copy books, manage inter-library loans, conduct outreach, manage the Lab’s scientific publications database, and locate obscure library materials, such as articles from the 1950s and 1960s in a Russian-language journal. More>

You can leave a comment. View the Comment Policy.

IT’s Soledad Toledano Featured in Nissan Video Series on Diversity

In the video, Toledano — who works in IT’s cybersecurity group — discusses her work and efforts to serve as a role model for other Latinas. “Soledad Toledano is opening the way for Latin women to be part of the fields that transform our technological future, such as cyber security,” the video explains. Watch the video here (in Spanish with English subtitles).

You can leave a comment. View the Comment Policy.

IT’s Stephen Lau Helped Save Lives During Santa Rosa Fire

A reserve police officer for Hayward, Lau was among those from departments all over the Bay Area to respond to Santa Rosa’s call for help last week. He and his crew drove towards the flames and went door-to-door in the Kendall and Oakmont neighborhoods telling residents to evacuate. Then as the flames grew, he and other officers had to make a run for it as well. More>

You can leave a comment. View the Comment Policy.

Password Requirements Transitioning to Passphrases

The password requirements for Berkeley Lab Identity accounts are changing so they are easier to remember and more secure. Instead of requiring special characters, we are transitioning to a passphrase approach. Your passphrase must be 14 characters and must be changed every 12 months. This goes into effect the next time you change your password. Go here for more (authentication required).

You can leave a comment. View the Comment Policy.

Creative Services Moves to Building 50B-1232

The Creative Services office is now in Building 50B-1232. The office can assist with design and illustration, business cards, branding, printing, and other services. Contact Caitlin Youngquist at x4020 or email creative@lbl.gov with any questions. See directions to the new location here.

You can leave a comment. View the Comment Policy.

IT Division Offers Oct. 5 Intro to Google Analytics Training

Google Analytics is a free service that gives website owners insights into how visitors interact with their site. This introductory course will help you learn who is visiting your site, how they got to your site, what they did on your site and more. The training runs from 1:30 to 2:30 p.m. To learn more and register, go here.

You can leave a comment. View the Comment Policy.

6th Annual LabTech on Oct. 11

LabTech is an annual free event for staff and friends focusing on computing and technology for Berkeley Lab users. Hosted by the IT Division, LabTech features technical tutorials, discussion sessions, networking opportunities, demonstrations, and more. To register, go here.

You can leave a comment. View the Comment Policy.

Lab Cyber Security Warns of Increase in Email Phishing Attacks

Recent attacks spoof (appear to come from) Lab employees or vendors and include a valid signature and phone number. The emails are addressed to the recipient’s full name, making them appear legitimate, and reference an attached invoice that is a .doc or .pdf file. The file is a virus or links to a fake login page. Examples are here. Use caution when receiving these emails.

You can leave a comment. View the Comment Policy.