EDUCAUSE | Blogs http://www.educause.edu/blogs en EDUCAUSE | Blogs http://www.educause.edu/blogs http://www.educause.edu/sites/all/themes/educause/images/e_rss.png Cybersecurity and Crime http://www.educause.edu/blogs/anonymous/cybersecurity-and-crime <p>This week of National Cyber Security Awareness Month centers on law enforcement and looks at the criminal issues surrounding cybersecurity. What follows are three parts aimed at giving you a strategic and tactical understanding of crime committed across the world using networks. Questions to enrich your understanding appear at the end of the blog.</p><p><a href="http://www.educause.edu/blogs/anonymous/cybersecurity-and-crime" target="_blank">read more</a></p> Tue, 28 Oct 2014 17:16:45 +0000 320851 at http://www.educause.edu Cyberbullying in Higher Education http://www.educause.edu/blogs/vvogel/cyberbullying-higher-education <p>By Navika Mahal and Vikram Kulothungan</p><p><strong><span style="line-height: 16.7999992370605px;">Navika Mahal and Vikram Kulothungan are graduate students in the Master of Science in Information Security Policy and Management (MSISPM) program at Heinz College, Carnegie Mellon University.</span></strong></p><p><a href="http://www.educause.edu/blogs/vvogel/cyberbullying-higher-education" target="_blank">read more</a></p> Mon, 27 Oct 2014 15:45:51 +0000 320788 at http://www.educause.edu 7 Ways to Boost Your Tech Skills without Going Back to School http://www.educause.edu/blogs/nhays/7-ways-boost-your-tech-skills-without-going-back-school <p>By Sameer Bhatia</p><p><strong>Sameer Bhatia is founder and CEO of </strong><a href="http://www.proprofs.com/knowledgebase/"><strong>ProProfs</strong></a><strong>.</strong></p><p>In the rapidly changing tech world today, it is hardly an exaggeration to say that the skills you learned even just a year or so ago are fast on their way to becoming obsolete. Over the past few years, it has become essential for tech workers to engage in education as a lifelong pursuit &#8212; a constant cycle of learning, unlearning, and relearning &#8212; as new technologies become available and new knowledge and skills become in demand.</p><p><a href="http://www.educause.edu/blogs/nhays/7-ways-boost-your-tech-skills-without-going-back-school" target="_blank">read more</a></p> Mon, 27 Oct 2014 14:52:57 +0000 320772 at http://www.educause.edu Podcast: Effective Video for MOOCs http://www.educause.edu/blogs/gbayne/podcast-effective-video-moocs <p>Elizabeth Evans is production lead at the Duke Digital Initiative. In this podcast interview, she explains how to produce effective video for instructors and why video is such an important component for connecting with students.</p><p><a href="http://www.educause.edu/blogs/gbayne/podcast-effective-video-moocs" target="_blank">read more</a></p> 13:09 EDUCAUSE Elizabeth Evans is production lead at the Duke Digital Initiative. In this podcast interview, she explains how to produce effective video for instructors and why video is such an important component for connecting with students. Elizabeth Evans is production lead at the Duke Digital Initiative. In this podcast interview, she explains how to produce effective video for instructors and why video is such an important component for connecting with students. Fri, 24 Oct 2014 19:48:38 +0000 320714 at http://www.educause.edu Policy Presentation at the EDUCAUSE Annual Conference http://www.educause.edu/blogs/jen-ortega/policy-presentation-educause-annual-conference <p>At EDUCAUSE&#8217;s 2014 Annual Conference in Orlando, Florida, Jarret Cummings, the association&#8217;s director of policy and external relations, and its policy and government relations advisors, Josh Ulman and Jennifer Ortega, reported on the status of several public policy issues of importance to EDUCAUSE and its members. These issues included:</p><p><a href="http://www.educause.edu/blogs/jen-ortega/policy-presentation-educause-annual-conference" target="_blank">read more</a></p> Fri, 24 Oct 2014 18:05:32 +0000 320705 at http://www.educause.edu EDUCAUSE Submits Net Neutrality Reply Comments and Participates in FCC Roundtable http://www.educause.edu/blogs/jen-ortega/educause-submits-net-neutrality-reply-comment-and-participates-fcc-roundtable <p>On September 15, EDUCAUSE and eleven other higher education associations submitted <a href="http://www.educause.edu/library/resources/2014-fcc-net-neutrality-rule-making-higher-educationlibraries-reply-comments">reply comments</a> to the Federal Communications Commission (FCC) on the agency&#8217;s current Open Internet Order and network neutrality proposal. The reply comments further clarified some of the concepts introduced in the coalition&#8217;s <a href="http://net.educause.edu/ir/library/pdf/EPO1401.pdf">original comments</a> submitted to the FCC on July 18.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/educause-submits-net-neutrality-reply-comment-and-participates-fcc-roundtable" target="_blank">read more</a></p> Thu, 23 Oct 2014 18:38:31 +0000 320630 at http://www.educause.edu EDUCAUSE Submits Letter to NIST on the Agency’s Cybersecurity Framework http://www.educause.edu/blogs/jen-ortega/educause-submits-letter-nist-agency%E2%80%99s-cybersecurity-framework <p>On October 10, EDUCAUSE submitted a letter to the National Institute of Standards and Technology (NIST) in response to the agency&#8217;s Request for Information (RFI) on the implementation of its cybersecurity framework released on February 12, 2014. The letter did not raise new concerns with the cybersecurity framework but instead directed NIST to review EDUCAUSE&#8217;s previously submitted <a href="http://csrc.nist.gov/cyberframework/rfi_comments/040813_educause.pdf" target="_blank">comments</a>&#160;in response to NIST&#8217;s original RFI, which was published on February 26, 2013, and sought input from stakeholders on the development of the framework.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/educause-submits-letter-nist-agency%E2%80%99s-cybersecurity-framework" target="_blank">read more</a></p> Thu, 23 Oct 2014 18:10:25 +0000 320622 at http://www.educause.edu Appellate Court Reverses Ruling on E-Reserves at Georgia State University http://www.educause.edu/blogs/jen-ortega/appellate-court-reverses-ruling-e-reserves-georgia-state-university <p>On October 18, a three-judge panel of the U.S. Court of Appeals for the 11<sup>th</sup> Circuit unanimously <a href="http://media.ca11.uscourts.gov/opinions/pub/files/201214676.pdf">reversed a district court ruling</a> in <em>Cambridge University Press et al. v Carl V. Patton et al., </em>a case in which Georgia State University was sued by Cambridge University Press, Oxford University Press, and SAGE Publications for 99 instances of copyright infringement.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/appellate-court-reverses-ruling-e-reserves-georgia-state-university" target="_blank">read more</a></p> Thu, 23 Oct 2014 17:58:16 +0000 320613 at http://www.educause.edu ED Delays Deadline for State Authorization Compliance for In-State Institutions http://www.educause.edu/blogs/jen-ortega/ed-delays-deadline-state-authorization-compliance-state-institutions <p>On June 24, the Department of Education (ED) published a <a href="https://www.federalregister.gov/articles/2014/06/24/2014-14721/institutional-eligibility-under-the-higher-education-act-of-1965-as-amended-delay-of-implementation">notice</a> in the Federal Register postponing state authorization compliance until July 1, 2015, for higher education institutions <em>operating within a state where the institution has a physical presence</em>. The rule would require postsecondary institutions gain authorization to operate in every state in which they are physically located. The rule was originally supposed to take effect on July 1, 2013, but implementation has now been delayed twice. While the federal government has put its authorization regulations on hold, each state still expects institutions to follow existing state authorization laws and regulations.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/ed-delays-deadline-state-authorization-compliance-state-institutions" target="_blank">read more</a></p> Thu, 23 Oct 2014 17:57:10 +0000 320612 at http://www.educause.edu Higher Ed Raises Concerns, Works with Proponents of the TEACH Act http://www.educause.edu/blogs/jcummings/higher-ed-raises-concerns-works-proponents-teach-act <p><span style="line-height: 1.4em;">In September, EDUCAUSE and a number of other higher education associations released an </span><a href="http://www.educause.edu/library/resources/technology-equality-and-accessibility-college-and-higher-education-act-teach-act-legal-analysis" style="line-height: 1.4em;">analysis</a><span style="line-height: 1.4em;"> of the Technology, Equality, and Accessibility in College and Higher Education (TEACH) Act. The proposed legislation, not to be confused with the already established TEACH Act on copyright issues (see the </span><a href="https://net.educause.edu/ir/library/pdf/ERB0915.pdf" style="line-height: 1.4em;">2009 ECAR Research Bulletin</a><span style="line-height: 1.4em;"> on the topic for more information), is intended to improve the accessibility of &#8220;electronic instructional materials and related technologies&#8221; for persons with disabilities.</span></p><p><a href="http://www.educause.edu/blogs/jcummings/higher-ed-raises-concerns-works-proponents-teach-act" target="_blank">read more</a></p> Thu, 23 Oct 2014 16:38:58 +0000 320611 at http://www.educause.edu Competition and Control http://www.educause.edu/blogs/dianao/competition-and-control <p>Diana G. Oblinger and Joanne Dehoney</p><p>This is the fifth in a blog series describing five &#8220;metatrends,&#8221; drawn from a review of articles in industry IT press, that affect CIOs in all IT sectors:</p><ul> <li><a href="http://www.educause.edu/blogs/dianao/challenges-scale">Challenges of scale</a></li> <li><a href="http://www.educause.edu/blogs/dianao/future-slant-analytics">Analytics</a></li> <li><a href="http://www.educause.edu/blogs/dianao/technology-and-work">Technology and work</a></li> <li><a href="http://www.educause.edu/blogs/dianao/business-value">Business value</a></li> <li>Competition and control</li></ul><p>&#160;</p><p>Each post in the <em>Future Slant</em> blog will describe one of these trends, suggesting implications for higher education.</p><p align="center">******</p><p><a href="http://www.educause.edu/blogs/dianao/competition-and-control" target="_blank">read more</a></p> Wed, 22 Oct 2014 18:02:47 +0000 320542 at http://www.educause.edu Cybersecurity: The Industry That Keeps on Growing http://www.educause.edu/blogs/vvogel/cybersecurity-industry-keeps-growing <p>By Kar Cheung</p><p><strong>Kar Cheung is the Marketing Manager at <a href="https://www.expressvpn.com">ExpressVPN</a>.</strong></p><p>The cybersecurity market has grown at an amazing rate over the past decade, and will continue to experience rapid expansion in years to come, according to <a href="http://www.marketsandmarkets.com/PressReleases/cyber-security.asp">MarketsandMarkets&#8217; latest report</a>. According to the report, the global cybersecurity market will grow from $95.60 billion in 2014 to $155.74 billion by 2019.</p><p>Within an industry known for selling firewalls, intrusion detection systems, antivirus software, encryption and authentication tools, and a whole host of other tools, one thing is for sure: the hackers are &#8212; and always will be &#8212; one step ahead.</p><p><a href="http://www.educause.edu/blogs/vvogel/cybersecurity-industry-keeps-growing" target="_blank">read more</a></p> Wed, 22 Oct 2014 15:07:21 +0000 320506 at http://www.educause.edu Online Security and Higher Education: What's at Stake http://www.educause.edu/blogs/vvogel/online-security-and-higher-education-what%E2%80%99s-stake <p>By Rich Murphy</p><p><strong>Rich Murphy is the Director of Technical Account Management at <a href="http://www.blackstratus.com/">BlackStratus</a>.</strong></p><p>The diverse range of users accessing IT resources both on and off campus presents a number of security issues for higher education institutions. Potential risks can include:</p><p><a href="http://www.educause.edu/blogs/vvogel/online-security-and-higher-education-what%E2%80%99s-stake" target="_blank">read more</a></p> Tue, 21 Oct 2014 15:00:31 +0000 320368 at http://www.educause.edu Using Information Security to Protect Intellectual Property http://www.educause.edu/blogs/jgrama/using-information-security-protect-intellectual-property <p><strong>Joanna Grama is director of Data, Research, and Analytics Operations and the IT Governance, Risk, and Compliance Program and Cybersecurity Programs at EDUCAUSE.</strong></p><p>When the topic of information security comes up, we often think first how it can protect an institution&#39;s operational data and information technology services. However, it also has an important role in protecting an institution&#39;s <em>intellectual property</em> &#8212; a person or organization&#39;s creative ideas, innovations, and inventions.</p><p>Intellectual property rights encourage innovation and discovery. The purpose of such rights is to give the legal owner of an invention or creative idea the exclusive opportunity to profit from it for a specified length of time. This means that the legal owner has the right to use the invention for personal profit and control how (or if) others can use it.</p><p><a href="http://www.educause.edu/blogs/jgrama/using-information-security-protect-intellectual-property" target="_blank">read more</a></p> Mon, 20 Oct 2014 15:07:57 +0000 320255 at http://www.educause.edu Secure Development of Internet of Things Products for Education http://www.educause.edu/blogs/vvogel/secure-development-internet-things-products-education <p>By Vaughn Eisler and Renault Ross</p><p><strong>Vaughn Eisler is a business development manager and </strong><a href="http://www.educause.edu/members/renault-ross"><strong>Renault Ross</strong></a><strong> is a national security architect at Symantec Corporation. </strong></p><p>The Internet of Things (IoT) represents a major departure in the history of the Internet, as connections move beyond computing systems and begin to power billions of everyday devices, from smart meters to home thermostats to remote e-learning systems. The market demands that these devices and sensors have a multilayered security and data management approach to ensure they are properly identified, secured, and trusted and that the data they produce remains private, managed, and analyzed.</p><p><a href="http://www.educause.edu/blogs/vvogel/secure-development-internet-things-products-education" target="_blank">read more</a></p> Wed, 15 Oct 2014 15:17:46 +0000 319991 at http://www.educause.edu Critical Infrastructure and the Internet of Things http://www.educause.edu/blogs/vvogel/critical-infrastructure-and-internet-things <p><strong>Karen McDowell is an information security analyst at the University of Virginia.</strong></p><p>The Internet of Things (IoT) interests and excites people for a number of reasons, not the least being that these Internet devices, ranging from industrial sensors to complex CT scanners, can make our lives easier, ensure more efficient delivery of goods and services, and give us more control over the environment than we ever thought possible. Businesses, &#34;on the cusp of an explosion in the potential and adoption of IoT,&#34;<sup>1</sup> are also vitally interested in the IoT because of the great potential in revenue growth and innovation, and long term sustained value.</p><p><a href="http://www.educause.edu/blogs/vvogel/critical-infrastructure-and-internet-things" target="_blank">read more</a></p> Tue, 14 Oct 2014 14:45:22 +0000 319776 at http://www.educause.edu Stop. Think. Connect. Everyone's a Target http://www.educause.edu/blogs/vvogel/stop-think-connect-everyones-target <p>By Shelby Cunningham, Marcelle Drakes-Ruffin, and Ashley Rae Tolbert</p><p><strong>Shelby Cunningham, Marcelle Drakes-Ruffin, and Ashley Rae Tolbert are graduate students in the Master of Science in Information Security Policy and Management (MSISPM) program at Heinz College, Carnegie Mellon University.</strong></p><p>When Target fell victim to hackers seeking credit-card numbers, we were shocked to learn that it started with a social engineering attack against an HVAC company they used. Surely, nobody would try to breach a retail giant through people who personally held nothing of value. But the teenager who fell for a fake MySpace login in 2006 could have grown up to become an employee who gives information to a fake colleague. Social engineering &#8212; manipulating human nature to get sensitive data &#8212; can expose anyone to attack. The good news? Simple strategies offer protection against attackers.</p><p><a href="http://www.educause.edu/blogs/vvogel/stop-think-connect-everyones-target" target="_blank">read more</a></p> Mon, 13 Oct 2014 18:46:54 +0000 319756 at http://www.educause.edu How to Think About MOOCs? http://www.educause.edu/blogs/nhays/how-think-about-moocs <p>By Nigel P. Melville</p><p><a href="http://nigelmelville.org/"><strong>Nigel P. Melville</strong></a><strong> is associate professor of Information Systems in the Stephen M. Ross School of Business at the University of Michigan.</strong></p><p>MOOCs are the latest in a long line of socio-technical systems to alter everyday work practices. One semester, a professor is teaching 85 MBA students in a large lecture hall, and the next, she&#39;s appearing in short online videos on Coursera viewed by thousands of students the world over. Overnight she&#39;s a household name. But what should we make of this?</p><p><a href="http://www.educause.edu/blogs/nhays/how-think-about-moocs" target="_blank">read more</a></p> Fri, 10 Oct 2014 20:44:04 +0000 319679 at http://www.educause.edu Improving Password Security Shouldn't Be Rocket Science http://www.educause.edu/blogs/nelsoncicchitto/improving-password-security-shouldnt-be-rocket-science <p><strong>Nelson Cicchitto is chairman and CEO of Avatier Corporation, a company he founded in 1997.</strong></p><p>It amazes me that, despite all the money being spent on security measures, from endpoints to data leak prevention to database security, the single largest vulnerability continues to be passwords. To be specific, 76% of all breaches over the past few years were based on weak or stolen password credentials according to one of the industry&#39;s <a href="http://www.verizonenterprise.com/DBIR/2014/">annual studies.</a></p><p>Developing a usable and secure password management system shouldn&#39;t be difficult. I have seen countless implementations of password management solutions that achieved major success in a short time.</p><p>An organizational password management implementation involves a number of key elements consisting of a blend of technology and internal business processes, including:</p><p><a href="http://www.educause.edu/blogs/nelsoncicchitto/improving-password-security-shouldnt-be-rocket-science" target="_blank">read more</a></p> Tue, 07 Oct 2014 18:14:09 +0000 319135 at http://www.educause.edu Security Awareness for IT Staff and Developers http://www.educause.edu/blogs/lspitzner/security-awareness-it-staff-and-developers <p><strong>Lance Spitzner is the training director for SANS Securing the Human.</strong></p><p>A common misconception, including among security professionals, is that if someone is technical, they must be secure. If someone knows how to code in Python, configure a Unix server, or maintain a network of routers, then they must be secure. Unfortunately, that is not the case. In fact, technical individuals often pose a greater risk to an organization than general users because of their privileged access. They develop the code that faces the Internet, the servers that maintain databases, or the routers that transfer information. Often these individuals not only require security awareness training but advanced security training designed specifically for their roles.</p><p><a href="http://www.educause.edu/blogs/lspitzner/security-awareness-it-staff-and-developers" target="_blank">read more</a></p> Mon, 06 Oct 2014 21:56:06 +0000 319098 at http://www.educause.edu 'Online Security' Need Not Be an Oxymoron http://www.educause.edu/blogs/raechelleclemmons/online-security-need-not-be-oxymoron <p><strong>Raechelle Clemmons is vice president and chief information officer at St. Norbert College.</strong></p><p><em>[Thanks to Raechelle Clemmons and the </em><a href="http://www.greenbaypressgazette.com/"><em>Green Bay Press Gazette</em></a><em> for allowing EDUCAUSE to republish </em><a href="http://www.greenbaypressgazette.com/story/money/2014/09/23/online-security-need-oxymoron/16117715/"><em>this column</em></a><em> for National Cyber Security Awareness Month. &#8212;Editor]</em></p><p>October is right around the corner, and with it comes fall (or is fall here already?) and National Cyber Security Awareness Month (NCSAM), a month dedicated to raising awareness about online security.</p><p>Now in its 11th year, NCSAM was created by the U.S. Department of Homeland Security and the National Cyber Security Alliance to &#8220;ensure every American has the resources they need to stay safer and more secure online.&#8221;</p><p><a href="http://www.educause.edu/blogs/raechelleclemmons/online-security-need-not-be-oxymoron" target="_blank">read more</a></p> Thu, 02 Oct 2014 14:09:59 +0000 318979 at http://www.educause.edu Control vs. Education: How Should We Change Human Behavior on Privacy and Data Security? http://www.educause.edu/blogs/dsolovelawgwuedu/control-vs-education-how-should-we-change-human-behavior-privacy-and-data-security <p><strong>Daniel J. Solove is the founder of </strong><a href="http://teachprivacy.com/"><strong>TeachPrivacy</strong></a><strong> and John Marshall Harlan Research Professor of Law, George Washington University Law School.</strong></p><p><a href="http://www.educause.edu/blogs/dsolovelawgwuedu/control-vs-education-how-should-we-change-human-behavior-privacy-and-data-security" target="_blank">read more</a></p> Thu, 02 Oct 2014 12:11:43 +0000 318978 at http://www.educause.edu Thursday's Hawkins Leadership Roundtable Agenda http://www.educause.edu/blogs/accidentalcio/thursdays-hawkins-leadership-roundtable-agenda <div>On Thursday morning roundtable members and participants will convene together at 7:30am in room 209 A/C in the Orlando Conference center. This is the last meeting of the roundtable for 2014 and we hope that you have found our time together extremely beneficial. Our breakfast meeting will include remarks and some question time with Nancy Zimpher, the Chancellor of the State University of New York System, who will also be delivering the final keynote of the conference at 10:15 am.</div><div>&#160;</div><div>Participants are asked to please fill out the evaluation form for the roundtable. Your feedback is essential to improving the roundtable for next year&#8217;s participants. We look forward to receiving your comments and suggestions.</div><div>&#160;</div><div><strong>About the Hawkins Leadership Roundtable</strong>: The Hawkins Leadership Roundtable is a leadership development program for new CIOs and individuals actively seeking a CIO role.</div><p><a href="http://www.educause.edu/blogs/accidentalcio/thursdays-hawkins-leadership-roundtable-agenda" target="_blank">read more</a></p> Wed, 01 Oct 2014 21:48:04 +0000 318973 at http://www.educause.edu Wednesday's Hawkins Leadership Roundtable Agenda http://www.educause.edu/blogs/accidentalcio/wednesdays-hawkins-leadership-roundtable-agenda <div>Tomorrow&#8217;s Hawkins Leadership Roundtable activities will continue to connect participants with council members in ways that focus on developing participants&#8217; leadership capabilities and elevating the work of their organizations.</div><div>&#160;</div><div>The links for Tuesday&#8217;s slide presentation can be found here: <a href="http://bit.ly/1pEqErt">http://bit.ly/1pEqErt</a></div><div>&#160;</div><div>Wednesday&#8217;s lunch will begin at 11:30 am in room W209 A/B in the Orlando conference center. During this session the council will focus on the topic of &#8220;conversations with presidents or senior executives.&#8221; During this session, each council member will play the role of an institutional president and role-play with participants using questions commonly asked of CIOs by senior executives.</div><p><a href="http://www.educause.edu/blogs/accidentalcio/wednesdays-hawkins-leadership-roundtable-agenda" target="_blank">read more</a></p> Tue, 30 Sep 2014 21:11:47 +0000 318888 at http://www.educause.edu National Cyber Security Awareness Month 2014 Is Here! http://www.educause.edu/blogs/michaelstaysafeonlineorg/national-cyber-security-awareness-month-2014-here-0 <p>Today marks the beginning of National Cyber Security Awareness Month (NCSAM), celebrated every October since 2004. NCSAM began as a collaborative effort between government and industry to provide people with the resources they need to stay safer and more secure online. Since its inception, the <a href="http://www.dhs.gov/">U.S. Department of Homeland Security</a> and the <a href="http://staysafeonline.org/">National Cyber Security Alliance</a> have led NCSAM, and these efforts have grown exponentially, reaching consumers, small and medium-sized businesses, corporations, educational institutions, and young people across the United States and internationally. NCSA, <a href="http://www.APWG.org">APWG</a>, and DHS also co-lead <a href="http://stopthinkconnect.org/">STOP. THINK. CONNECT.</a>, the global cyber security education and awareness campaign.</p><p><a href="http://www.educause.edu/blogs/michaelstaysafeonlineorg/national-cyber-security-awareness-month-2014-here-0" target="_blank">read more</a></p> Tue, 30 Sep 2014 13:52:21 +0000 318760 at http://www.educause.edu