Educational Procurement Journal - Spring 2018 - 11

animals, teams, or anything else that
other people may know about you
or be able to figure out from social
media or other sources. Passwords
should be different for each account.
A strong password is one that is made
up of a passphrase or a combination
of words that makes no sense, pulling
from a combination of upper case,
lower case, numbers, and special
characters. Alternatively, a password
manager is an excellent tool that
creates the complex password for
you; you will, however, need at least
one strong password to access
the manager.
Valerie: What should you do
to reduce the chances of your
password from being compromised?
Sue: Again, never share your
passwords with others. Never write
down passwords. Create a strong
password for each account and
check it against a password checker.
GVSU has a password checker at
https://www.gvsu.edu/cybersafety/
password-security-2.htm. Initiate the
screensaver when you leave your
computer unattended. Be cautious
when clicking on links or attachments
in emails and never key in your
account credentials from one of those
links. Do not log in to any personal
information or work accounts from
a public computer or on an open
Wi-Fi network.
Valerie: How do you identify hoax
virus warnings?
Sue: Typically these are found when
browsing the Internet or possibly from
an email. Never click on the links or
make the phone call to "improve" your
browser speed or "fix" your computer.
Immediately close all applications,
shut down and come back up in Safe
Mode, if possible. Run the anti-virus
and anti-malware applications that
are on your computer. If it is a work
computer, contact your IT Helpdesk
and ask them to run a scan or to
walk you through what you should
do next. If you continue to see hoax
warnings or if your browser start
pages direct you to other websites,
seek professional assistance to

inspect your computer, as it will
probably need to be re-imaged or
restored to the way it was prior to the
virus/malware. If the hoax appears on
a mobile device, you might consider
doing a factory reset.
Valerie: What are some of the results
from hoax virus warnings and
malicious spam?
Sue: Hoax virus warnings can
create browsers opening to locations
that you did not select, typically
asking you to click on the site to
resolve your computer problem, or
they can trigger pop-ups every few
seconds or every time you try to
go to another site. Malicious spam
can wreak havoc on your email,
as it could start sending email to
your contacts and potentially cause
others to click on the links, which,
in turn, propagates the problem and
may result in additional credentials
being hacked.
Valerie: How do you to recover from
a hacked device?
Sue: If your device has been
hacked, the first thing to do is to
quit using it. The more you use it
and access accounts, the more
information you potentially could
be giving to hackers. If it is a work
computer, contact your IT office
immediately. If it is your personal
machine, get help from a reputable
source. As soon as possible,
change your account passwords
on a machine that has not been
compromised. Contact any banks
or personal accounts you feel have
been hacked to have them change
accounts and add extra security if
it is available, such as two-factor
authentication. Contact the credit
bureaus with a fraud alert to monitor
your accounts. A good source to
review-and to prepare yourself in
case of identity theft-is USA.gov.
Valerie: We are at the end of our
interview. Any final thoughts and
or advice on cyber security that we
have not covered?
Sue: Cyber security is everyone's
responsibility. IT cannot protect us

from ourselves. We need to take
cyber-safety education seriously. Slow
down and think before you click. Ask
questions, make an extra phone call
before giving away data that might be
asked of you. If it takes a little longer
to get something done, it will be worth
the effort-if it saves you from being a
victim or contributing to the scam.

Valerie Rhodes-Sorrelle, M.P.A,
C.P.M., 2013-2014 NAEP President,
is Senior Strategic Sourcing
Specialist at Grand Valley State
University, Allendale, Michigan,
where she has worked for more
than 27 years in the Procurement
Services Department. Valerie
was awarded NAEP's Bert C.
Ahrens Achievement Award
2015-2016. She is a corporate
member of the Michigan Minority
Supplier Development Council
and member of the Positive Black
Women organization, where she
served as Treasurer for 10 years.
She has served on the Women of
Achievement & Courage Committee
for the Michigan Women's
Foundation for over a decade. She
has a B.S. degree from Ferris State
University and a Master of Public
Administration from Grand Valley
State University. Ms. RhodesSorrelle writes for NAEP's Journal
of Educational Procurement and
serves on the Association's Editorial
Board. Email: rhodesv@gvsu.edu.

Susan K. Korzinek, Associate
Vice President and CIO at Grand
Valley State University, worked
for Universal Forest Products as a
Systems Analyst before coming to
GVSU in 1993. Her Grand Valley
career has included positions in
Administrative Computing and
Academic Computing and as
Director of Information Technology.
She graduated from GVSU in
1983 with a B.A. in Computing
Information Systems. Email:
Korzines@gvsu.edu.

EDUCATIONAL PROCUREMENT JOURNAL | www.naepnet.org

11


https://www.gvsu.edu/cybersafety/password-security-2.htm http://www.USA.gov http://www.naepnet.org

Table of Contents for the Digital Edition of Educational Procurement Journal - Spring 2018

Letter from the CEO
Cyber Security—Everyone’s Business
Scammed—How to Protect Your University
Have Festival, Will Travel: Virginia’s Advocacy Program for Small-, Women-, and Minority-owned Businesses
What Is It You Can’t Do?
Heard on the Street: New Hot Topics from the NAEP Exchange
Building a Fund of Sustainability Knowledge, One Book at a Time— Part Eight
Best and Final: Crowdsourcing Beyond the Buzzword
Index to Advertisers
Educational Procurement Journal - Spring 2018 - Intro
Educational Procurement Journal - Spring 2018 - cover1
Educational Procurement Journal - Spring 2018 - cover2
Educational Procurement Journal - Spring 2018 - 3
Educational Procurement Journal - Spring 2018 - 4
Educational Procurement Journal - Spring 2018 - 5
Educational Procurement Journal - Spring 2018 - Letter from the CEO
Educational Procurement Journal - Spring 2018 - 7
Educational Procurement Journal - Spring 2018 - Cyber Security—Everyone’s Business
Educational Procurement Journal - Spring 2018 - 9
Educational Procurement Journal - Spring 2018 - 10
Educational Procurement Journal - Spring 2018 - 11
Educational Procurement Journal - Spring 2018 - Scammed—How to Protect Your University
Educational Procurement Journal - Spring 2018 - 13
Educational Procurement Journal - Spring 2018 - 14
Educational Procurement Journal - Spring 2018 - 15
Educational Procurement Journal - Spring 2018 - Have Festival, Will Travel: Virginia’s Advocacy Program for Small-, Women-, and Minority-owned Businesses
Educational Procurement Journal - Spring 2018 - 17
Educational Procurement Journal - Spring 2018 - What Is It You Can’t Do?
Educational Procurement Journal - Spring 2018 - 19
Educational Procurement Journal - Spring 2018 - Heard on the Street: New Hot Topics from the NAEP Exchange
Educational Procurement Journal - Spring 2018 - 21
Educational Procurement Journal - Spring 2018 - Building a Fund of Sustainability Knowledge, One Book at a Time— Part Eight
Educational Procurement Journal - Spring 2018 - 23
Educational Procurement Journal - Spring 2018 - 24
Educational Procurement Journal - Spring 2018 - 25
Educational Procurement Journal - Spring 2018 - Best and Final: Crowdsourcing Beyond the Buzzword
Educational Procurement Journal - Spring 2018 - 27
Educational Procurement Journal - Spring 2018 - 28
Educational Procurement Journal - Spring 2018 - 29
Educational Procurement Journal - Spring 2018 - Index to Advertisers
Educational Procurement Journal - Spring 2018 - cover3
Educational Procurement Journal - Spring 2018 - cover4
http://www.nxtbook.com/naylor/NEPQ/NEPQ0318
http://www.nxtbook.com/naylor/NEPQ/NEPQ0218
http://www.nxtbook.com/naylor/NEPQ/NEPQ0118
http://www.nxtbook.com/naylor/NEPQ/NEPQ0417
http://www.nxtbook.com/naylor/NEPQ/NEPQ0317
http://www.nxtbookMEDIA.com