Substance Abuse Counseling
Leeward Community College Newsletter 3/18/2015
I hope you all find this newsletter helpful, interesting, and exciting. Please do not hesitate to contact me if you have any questions or concerns.
Peer Mentor Substance Abuse Counseling Program
Words of Encouragement
YOU CAN DO IT!
By: Marguerite Kono
Health & Information Technology
As we approach our midterms I’m sure you are all immersed in studying for them. If you are among the lucky students who aren’t stressing over midterms, but are simply chugging along with your assignments and quizzes, I’m sure you will still appreciate the sentiment as well. I thought I would take this opportunity to share some uplifting and motivational quotes and statements with you.
“SUCCESS CONSISTS OF GOING FROM FAILURE TO FAILURE WITHOUT LOSS OF ENTHUSIASM.” -Winston Churchill
“Our greatest weakness lies in giving up. The most certain way to succeed is always to try just one more time.” –Thomas A. Edison
“Man often becomes what he believes himself to be. If I keep on saying to myself that I cannot do a certain thing, it is possible that I may end by really becoming incapable of doing it. On the contrary, if I have the belief that I can do it, I shall surely acquire the capacity to do it even if I may not have it at the beginning.” – Mahatma Gandhi
Obstacles are those frightful things you see when you take your eyes off your goal. ~Henry Ford
I hope these inspirational tidbits remind you to continue to persevere and to conquer that midterm, project, or assignment. You have worked so hard to get to this point and you owe it to yourself to achieve a successful outcome. Good luck to one and all!
ADAD Trauma Training
Alcohol and Drug Abuse Division Training: Trauma Informed Care
Friday April 17, 2015 from 8:00 AM to 4:00 PM HST
Add to Calendar
WhereJ. Walter Cameron Center
95 Mahalani Street
Wailuku, HI 96793
$25.00 payable to CDFH by credit card through this registration site. Personal/cashiers, agency checks and money orders are accepted and may be mailed to:
Coalition for a Drug-Free Hawaii
Attn: Michelle Park
1130 N. Nimitz Hwy. Suite A259
Honolulu, HI 96817
Registration DeadlineMonday, April 6, 2015
Open to first 50 registrants
6 CSAC & CPS hours ADAD approved
Coalition for a Drug-Free Hawaii
Hawaii Pacific Center for Excellence
808-545-3228 ext. 37
The purpose of theTrauma Informed Care training is to develop awareness of unique insights and best practice strategies for identification of, engagement with, and providing resolution for individuals who have experienced trauma across the lifespan.
Instructor: Bernie Strand, LCSW, CSAC, has worked in human services for 24 years. She has worked closely with the National Child Traumatic Stress Network, (NCTSN), child protective services, courts, schools and pediatricians. She seeks to promote humane, informed, gender-specific responses to the unique needs those impacted by trauma.
Target Audience: Certified Substance Abuse Counselors (CSAC) and Certified Prevention Specialist (CPS), CSAC applicants, those with other ADAD professional credentials, and anyone involved in the human services profession.
- Complete registration by clicking on the link below.
- Seat availability is on a first-come, first-served basis and is not confirmed without payment.
- The $25.00 fee is non-refundable. Payment must be received by registration deadline. Payment by check will be processed as received.
- Please include a copy of email confirmation with check or money order payment.
- Walk-in registrations are not accepted.
Protect yourself from Hackers
This is an article in a series that shares information and tactics to protect yourself online, both at home and at work. You've seen the emails about phishing attempts, but have you heard about phraming? What about phreaking? Click-jacking? Doxing?
Adversaries employ a variety of tactics to cause harm online. To protect yourself, it is critical to be aware of the threat landscape. Use these 10 definitions from the Federal Bureau of Investigation to stay safe:
1.Baiting - Someone gives you a USB drive or other electronic media that is preloaded with malware. When you use the device, it enables them to hack your computer.
Do not use any electronic storage device unless you know its origin is legitimate and safe. Scan all electronic media for viruses before use. Turn off Auto Play since that will execute the malware before it has a chance to be scanned.
2.Click-jacking - Concealing hyperlinks beneath legitimate clickable content that, when clicked, cause a user to unknowingly perform actions, such as downloading malware or sending your identification to a site.
Numerous click-jacking scams have employed "Like" and "Share" buttons on social networking sites. Disable scripting and iframes in whatever Internet browser you use as a first line of defense.
3.Cross-Site Scripting (XSS) - Malicious code is injected into a benign or trusted website. A stored XSS attack is when malicious code is permanently stored on a server - a computer is compromised when requesting the stored data. A reflected XSS attack is when a person is tricked into clicking on a malicious link - the injected code travels to the server then reflects the attack back to the victim's browser. The computer deems the code is from a trusted source.
One way to prevent becoming a victim of XSS is to turn off "HTTP TRACE" support on all webservers. Additionally, users can protect themselves by avoiding sites with known vulnerabilities and remaining vigilant regarding phishing attempts. One more option is to use different browsers for different activities, such as email, banking, and social media. Be careful opening multiple accounts at the same time.
4.Doxing - Publicly releasing a person's identifying information including full name, date of birth, address, and pictures typically retrieved from social networking site profiles.
Be careful what information you share online, in print, and in person about yourself, your family, and your friends.
5.Elicitation - The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated.
Be aware of elicitation tactics and the way social engineers try to obtain personal information.
6.Pharming - Redirecting users from legitimate websites to fraudulent ones, such as those that mimic bank websites, for the purpose of extracting confidential data.
Watch out for website URLs that use variations in spelling or domain names, or use ".com" instead of ".gov," for example. Type a website's address rather than clicking on a link.
7.Phishing - Usually an email that looks like it is from a legitimate organization or person, but is not and contains a link or file with malware. Phishing attacks typically try to snag any random victim. Spear phishing attacks target a specific person or organization as their intended victim.
Do not open email or email attachments or click on links sent from people you do not know. If you receive a suspicious email from someone you know, ask them about it before opening it. Be sure to follow up and report phishing attempts.
Example: In March 2011, hackers sent two spear phishing emails to a small group of employees at the security firm RSA. They only needed one employee to open an infected file and launch the malware. The malware downloaded information from RSA that then helped the hackers learn how to defeat RSA's security token. In May and June 2011, a number of defense contractors' networks were breached via the compromised RSA token.
8.Phreaking - Gaining unauthorized access to telecommunication systems.
Do not give out secure phone numbers that provide direct access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network.
9.Scams - Fake deals that trick people into providing money, information, or service in exchange for the deal.
If it sounds too good to be true, it is most likely a scam. Cyber criminals use popular events and news stories as bait for people to open infected email, visit infected websites, or donate money to bogus charities.
Example: Before the 2010 World Cup, cyber criminals offered tickets for sale or sent phishing emails claiming you won tickets to see the event.
10.Spoofing - Deceiving computers or computer users by hiding or faking one's identity. Email spoofing uses a sham email address or simulates a genuine email address. Internet Protocol (IP) spoofing hides or masks a computer's IP address.
Know your co-workers and clients, and beware of those who impersonate a staff member or service provider to gain company or personal information.
A good rule of thumb to protect yourself against many of these tactics is to keep your security software, web browsers, applications, and operating system up to date. Turn on automatic updates if that's an available option.
For more information on protecting yourself online, read the previous article in this series: Good Password Management and Two-Factor Authentication. Be sure to stay tuned to Dateline for the next article in this series: Social Engineering Through Email, Links, and Websites.