Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
The Boyfriend Dilemma: Are You Giving Up Too Much Personal Information?
Guest Bloggers: Lisa Ho, Matt Wolf, and Erika Donald, University of California, Berkeley
Usability and Network Security in Higher Education
Guest Blogger: Rich Murphy, Director of Technical Account Management, @BlackStratus
IT Systems administrators working in an academic setting are often faced with the unenviable task of balancing two seemingly disparate priorities: managing and mitigating security risks, and ensuring a user experience that is intuitive, seamless and reliable. This dilemma is not a new one — Frederick M. Avolio, writing at Networkcomputing.com, notes that “security and usability are often inversely proportional.”
Data Privacy Month 2014: January 28-February 28
Did you know that Data Privacy Month (January 28-February 28, 2014) is just two months away? Now is the perfect time for colleges and universities to start planning activities and events.
Here are several ways that you can help raise awareness about data privacy issues on your campus.
NCSAM 2013 Highlights
As the 10th anniversary of National Cyber Security Awareness Month (NCSAM) wraps up, we would like to thank the higher education community for another successful celebration. Colleges and universities continue to offer fun, creative activities and events for students, faculty, staff, and their local communities. Here are just a few highlights.
NCSAM Champions: 100 higher education institutions showed their support along with individuals, businesses, organizations, and government.
NCSAM Activities: Over 190 institutions shared their plans during the month of October. See what events took place by visiting the NCSAM Resource Kit.
Cybersecurity and the Electric Grid
When was the last time you replaced your computer? How about your mobile phone?
Imagine yourself today, with a desktop computer from 2003 sitting in front of you. You've managed to dust it off and clean it up enough that it actually starts up and runs pretty reliably.
Now your mission is to move money from one of your online bank accounts or retirement accounts to another - maybe at a different bank or fund - all using this machine from 2003.
Think you could do it? Would you want to?
What if the computer was actually from 1993?
How to Protect Yourself from Cybercriminals
Guest Blogger: Martin Holste, @mcholste
Security is about people and their motives, and understanding the underlying goals of criminals can help you better understand how to stay safe online. Several years ago, the online criminal world shifted into a fully-fledged black market carrying commodities for sale between criminals. As in the physical world, understanding what is valuable to a criminal is critical for prioritizing your defenses. In addition to your funds, other assets such as your online accounts, use of your computer, and even your geographic location are all a commodity to be traded and sold to the highest bidder.
Building Effective and Meaningful Cybersecurity Policies
Guest Blogger: Dr. Barbara Endicott-Popovsky, Director, Center for Information Assurance and Cybersecurity, University of Washington
Note: The following information is presented for students currently enrolled in MLIS programs, as well as teacher-librarians, and other educators in the K-12 and higher education communities.
Teacher-librarians, in addition to managing the application inventory on school computers, are often given the task of controlling computer access. Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do.
Guest Blogger: Ron Pike, Ph.D., Assistant Professor, Computer Information Systems, Cal Poly Pomona
There is a debate on the appropriate age to start teaching cybersecurity, with mainstream opinions ranging from the 5th grade to the freshman year of college. I suggest the appropriate time to start is pre-kindergarten. I believe this because I believe any ICT (Information and Computing Technologies) training is cybersecurity training. Cybersecurity professionals who learn to write policies and manage departments without an underlying rich ICT skill set is unable to manage changes and crises that come along.
Touch ID: Net Benefit or Net Loss?
With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the iPhone, and for authorizing purchases in iTunes and the App Store. While Apple is not the first vendor to introduce fingerprint recognition in a smartphone, it is very likely that the iPhone will be many users' first exposure to biometric authentication.
How Colleges and Universities Can Support NCSAM
Colleges and universities play an essential role in ensuring students, faculty and staff stay safe and secure online. A great place to start is by participating in National Cyber Security Awareness Month this October. Whether you are able to show your support for just one day or every day this October, consider the following ways you can make a difference to raise cybersecurity awareness.