Press Release

 Here is a press release I prepared for a class a few weeks ago. It was my first time writing one, but luckily a friend provided me with some great examples of how they should be written.

CONTACT: Thomas Roberts

Social Networking Awareness and Identity Theft Precaution Presentation

BOWLING GREEN, OH – Bowling Green State University is set to host the Social Networking Awareness and Identity Theft Precaution Presentation October 21, 2009. It will be held in room 206 in the Bowen-Thompson Student Union at 2:00 p.m.

The event was scheduled for this month, because since 2001, October has been declared National CyberSecurity Awareness Month by the National Cyber Security Alliance and other organizations.

The presentation will focus on how students can protect their online identities and how to minimize the general risks of online identity theft. The university has invited FBI agents to present scenarios relating to identity fraud and methods that are used when criminals try to commit identity fraud. Students will have the opportunity to respond with personal anecdotes or opinions on the overall subject.

Information Security Analyst at BGSU Tom Roberts said in an email that cyber security is very important to the education of the students at the university.

“Although October is National Cyber Security Awareness Month, awareness regarding cyber security is an on- [going] mission at BGSU,” Roberts said.

Roberts encourages all students who are available to attend the event.

“We feel it will be a very though provoking and interesting presentation for all that attend,” Roberts said.

The university is just one of many around the U.S. sponsoring cyber security-related events. West Virginia University’s OIT staff are posting weekly blog entries on their website dealing with subjects similar to identity theft.  

The cyber security presentation will be an hour long and will allow 30 minutes at the end for questions or comments from the audience. It is open to the public and is sponsored by the university’s Information Security Office.

For more information visit

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s