Main Nav

Building Effective and Meaningful Cybersecurity Policies

Guest Blogger: Dr. Barbara Endicott-Popovsky, Director, Center for Information Assurance and Cybersecurity, University of Washington

Note: The following information is presented for students currently enrolled in MLIS programs, as well as teacher-librarians, and other educators in the K-12 and higher education communities.

Teacher-librarians, in addition to managing the application inventory on school computers, are often given the task of controlling computer access. Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do.

Cybersecurity Education

Guest Blogger: Ron Pike, Ph.D., Assistant Professor, Computer Information Systems, Cal Poly Pomona

There is a debate on the appropriate age to start teaching cybersecurity, with mainstream opinions ranging from the 5th grade to the freshman year of college. I suggest the appropriate time to start is pre-kindergarten. I believe this because I believe any ICT (Information and Computing Technologies) training is cybersecurity training. Cybersecurity professionals who learn to write policies and manage departments without an underlying rich ICT skill set is unable to manage changes and crises that come along.

Tags from the EDUCAUSE Library

Tags from the Community

Touch ID: Net Benefit or Net Loss?

Guest Blogger: Joshua Wright, @joswr1ght

Figure 1: Touch ID in Action. Source: Apple

With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the iPhone, and for authorizing purchases in iTunes and the App Store. While Apple is not the first vendor to introduce fingerprint recognition in a smartphone, it is very likely that the iPhone will be many users' first exposure to biometric authentication.

How Colleges and Universities Can Support NCSAM

Colleges and universities play an essential role in ensuring students, faculty, and staff stay safe and secure online. A great place to start is by participating in National Cyber Security Awareness Month this October. Whether you are able to show your support for just one day or every day this October, consider the following ways you can make a difference to raise cybersecurity awareness.

Tags from the EDUCAUSE Library

Share Your Plans for NCSAM 2013

If your campus is hosting an event or activity in October, please e-mail your plans and links to additional information. We will include your college or university's activities in our list of 2013 Campus Events.

Last year we collected over 120 links from institutions and we hope to increase that number in 2013 for the 10th anniversary of National Cyber Security Awareness Month (NCSAM)!

Looking for FREE events to host?

Here are a few webinars scheduled in October that will focus on information security awareness.

Tags from the EDUCAUSE Library

Tags from the Community

Prepare for National Cyber Security Awareness Month 2013

Did you know that National Cyber Security Awareness Month (NCSAM) is less than two months away?

We are celebrating the 10th anniversary of NCSAM this October.

Here are a few ways you can show your support and help us make NCSAM 2013 the most successful yet!

Tags from the EDUCAUSE Library

Tags from the Community

Are You Ready? National Cyber Security Awareness Month: October 2013

Summer is the perfect time to start planning for National Cyber Security Awareness Month (NCSAM). We invite every institution to help EDUCAUSE and NCSA make this October the most successful NCSAM celebration since the campaign started 10 years ago.

But wait! Don't start from scratch. We've gathered resources that can be adapted by your campus.

Tags from the EDUCAUSE Library

Tags from the Community

Join InCommon Virtual Working Group Meetings, May 20-21

IAM Online, the monthly webinar series sponsored by InCommon, Internet2, and EDUCAUSE, has scheduled a special series of virtual working group meetings, May 20–21, 2013, to showcase key identity and access management (IAM) tools and services. During these "open house" meetings, working group members will share background information and provide overviews for current identity-related projects and programs, as well as host interactive discussions about current work and plans for the future. Hear how your campus can benefit, and find out how to get involved.

Join one or join them all—there is no charge for any of the sessions!

Monday, May 20 (all times Eastern):

Tags from the Community

Incident Management and Response Checklist

Rather than waiting for a data breach to happen, consider using an incident checklist to establish a campus incident response team, review your institution's readiness, and develop (or adjust) your incident management and response roadmap. In a recent Security listserv discussion, one campus was seeking an incident response decision tree or process flow to help determine when it's appropriate to perform forensic analysis of a compromised machine that accesses or stores sensitive data.