Main Nav

Let's Get Ready for NCSAM 2014

NCSAM 2014National Cyber Security Awareness Month is just 3 months away. Have you started planning events and activities for your campus yet? Join EDUCAUSE and NCSA as we celebrate the 11th annual NCSAM this October.

We've gathered resources that can be adapted by your institution:

Tags from the EDUCAUSE Library

Usability and Network Security in Higher Education

Guest Blogger: Rich Murphy, Director of Technical Account Management, @BlackStratus


Rich Murphy BlackStratus

IT Systems administrators working in an academic setting are often faced with the unenviable task of balancing two seemingly disparate priorities: managing and mitigating security risks, and ensuring a user experience that is intuitive, seamless and reliable. This dilemma is not a new one — Frederick M. Avolio, writing at Networkcomputing.com, notes that “security and usability are often inversely proportional.”

Tags from the EDUCAUSE Library

Data Privacy Month 2014: January 28-February 28

Data Privacy Month 2014

Did you know that Data Privacy Month (January 28-February 28, 2014) is just two months away? Now is the perfect time for colleges and universities to start planning activities and events.

Here are several ways that you can help raise awareness about data privacy issues on your campus.

Tags from the Community

NCSAM 2013 Highlights

National Cyber Security Awareness Month 10th Anniversary

As the 10th anniversary of National Cyber Security Awareness Month (NCSAM) wraps up, we would like to thank the higher education community for another successful celebration. Colleges and universities continue to offer fun, creative activities and events for students, faculty, staff, and their local communities. Here are just a few highlights.

NCSAM Champions: 100 higher education institutions showed their support along with individuals, businesses, organizations, and government.

NCSAM Activities: Over 190 institutions shared their plans during the month of October. See what events took place by visiting the NCSAM Resource Kit.

Tags from the EDUCAUSE Library

Tags from the Community

Cybersecurity and the Electric Grid

Guest Blogger: Darren Highfill, Founder & Managing Partner, @UtiliSec


Electric Grid cybersecurity

When was the last time you replaced your computer? How about your mobile phone?

Imagine yourself today, with a desktop computer from 2003 sitting in front of you. You've managed to dust it off and clean it up enough that it actually starts up and runs pretty reliably.

Now your mission is to move money from one of your online bank accounts or retirement accounts to another - maybe at a different bank or fund - all using this machine from 2003.

Think you could do it? Would you want to?

What if the computer was actually from 1993?

Tags from the EDUCAUSE Library

Tags from the Community

How to Protect Yourself from Cybercriminals

Guest Blogger: Martin Holste, @mcholste


Identity Theft for Criminals. Source: Student Video and Poster Contest

Security is about people and their motives, and understanding the underlying goals of criminals can help you better understand how to stay safe online. Several years ago, the online criminal world shifted into a fully-fledged black market carrying commodities for sale between criminals. As in the physical world, understanding what is valuable to a criminal is critical for prioritizing your defenses. In addition to your funds, other assets such as your online accounts, use of your computer, and even your geographic location are all a commodity to be traded and sold to the highest bidder.

Building Effective and Meaningful Cybersecurity Policies

Guest Blogger: Dr. Barbara Endicott-Popovsky, Director, Center for Information Assurance and Cybersecurity, University of Washington


Note: The following information is presented for students currently enrolled in MLIS programs, as well as teacher-librarians, and other educators in the K-12 and higher education communities.

Teacher-librarians, in addition to managing the application inventory on school computers, are often given the task of controlling computer access. Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do.

Cybersecurity Education

Guest Blogger: Ron Pike, Ph.D., Assistant Professor, Computer Information Systems, Cal Poly Pomona


There is a debate on the appropriate age to start teaching cybersecurity, with mainstream opinions ranging from the 5th grade to the freshman year of college. I suggest the appropriate time to start is pre-kindergarten. I believe this because I believe any ICT (Information and Computing Technologies) training is cybersecurity training. Cybersecurity professionals who learn to write policies and manage departments without an underlying rich ICT skill set is unable to manage changes and crises that come along.

Tags from the EDUCAUSE Library

Tags from the Community

Touch ID: Net Benefit or Net Loss?

Guest Blogger: Joshua Wright, @joswr1ght


Figure 1: Touch ID in Action. Source: Apple

With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the iPhone, and for authorizing purchases in iTunes and the App Store. While Apple is not the first vendor to introduce fingerprint recognition in a smartphone, it is very likely that the iPhone will be many users' first exposure to biometric authentication.

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.