EDUCAUSE | Security Awareness http://www.educause.edu/Resources/Browse/SecurityAwareness/30439 en EDUCAUSE | Security Awareness http://www.educause.edu/Resources/Browse/SecurityAwareness/30439 http://www.educause.edu/sites/all/themes/educause/images/e_rss.png 2013 Security Awareness Video & Poster Contest Winners Announced http://www.educause.edu/blogs/vvogel/2013-security-awareness-video-poster-contest-winners-announced <p>Nine winners of the <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-initiative/community-engagement/information-security-awareness-">5th Annual Information Security Awareness Video and Poster Contest</a> have been selected. The winning videos and posters are <a href="https://www.facebook.com/VideoPosterContest">now available</a> for colleges and universities to use in campus security awareness campaigns during National Cyber Security Awareness Month in October, student orientations, and throughout the year.</p><p><a href="http://www.educause.edu/blogs/vvogel/2013-security-awareness-video-poster-contest-winners-announced" target="_blank">read more</a></p> Mon, 22 Apr 2013 23:45:39 +0000 286516 at http://www.educause.edu Security Smackdown: End-User Awareness Programs vs. Technology Solutions http://www.educause.edu/events/security-professionals-conference/2013/security-smackdown-end-user-awareness-programs-vs-technology-solutions How effective is end-user security awareness education? Would it be better to allocate our scarce resources to improving our technology? Two members of the same information security team at the University of Pennsylvania will square off on opposite sides: "They'll never learn and they shouldn't have to!" versus "We're only as strong as our weakest user!" In a point-counterpoint format, we will consider various types of end-user awareness tools (blogs, videos, etc.) and the sorts of problems they aim to solve. We'll debate whether we are effectively reaching our end users and if technological alternatives are within our reach that can accomplish similar ends. <p><a href="http://www.educause.edu/events/security-professionals-conference/2013/security-smackdown-end-user-awareness-programs-vs-technology-solutions" target="_blank">read more</a></p> Sat, 29 Dec 2012 00:03:09 +0000 278931 at http://www.educause.edu Data Custodians, It's 11 p.m.: Do You Know Where Your Confidential Data Is? http://www.educause.edu/midwest-regional-conference/2013/data-custodians-its-11-pm-do-you-know-where-your-confidential-data Many campuses find that the proliferation and continued storage of confidential data on desktop and laptop computers to be one of their top security risks. In combination with policy and awareness programs, data loss prevention products can be used to proactively identify and directly notify end users of these sources of risk for proper remediation. Our panelists will share their experiences working with academic, administrative, and governance units to protect data&#8212;legally, ethically, and technically. Bring your experience and questions to this important session. <p><a href="http://www.educause.edu/midwest-regional-conference/2013/data-custodians-its-11-pm-do-you-know-where-your-confidential-data" target="_blank">read more</a></p> Mon, 26 Nov 2012 20:02:21 +0000 277049 at http://www.educause.edu Advice from Lance Spitzner on Information Security Careers http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-information-security-careers <p>I often get requests asking how to get started in information security. I can&#39;t blame people, it is an extremely exciting field. What I like most about it is that everything is so new; often there are no rules on how to do things. You make the rules up as you go along, almost like blazing a path in the wild jungle just as the explorers did hundreds of years ago.</p><p>Here are some suggestions on how to get started based on my experience. I feel these work regardless if you are an existing IT person or coming from a different field. Personally, my background was a History major that spent four years in the Army driving around in tanks, so if you have the passion anyone can get started in this field.</p><p><a href="http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-information-security-careers" target="_blank">read more</a></p> Mon, 29 Oct 2012 19:46:59 +0000 274671 at http://www.educause.edu Advice from Lance Spitzner on Cybersecurity Careers http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-cybersecurity-careers <p>I often get requests asking how to get started in information security. I can&#39;t blame people, it is an extremely exciting field. What I like most about it is that everything is so new; often there are no rules on how to do things. You make the rules up as you go along, almost like blazing a path in the wild jungle just as the explorers did hundreds of years ago.</p><p>Here are some suggestions on how to get started based on my experience. I feel these work regardless if you are an existing IT person or coming from a different field. Personally, my background was a History major that spent four years in the Army driving around in tanks, so if you have the passion anyone can get started in this field.</p><p><a href="http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-cybersecurity-careers" target="_blank">read more</a></p> Mon, 29 Oct 2012 19:45:51 +0000 274670 at http://www.educause.edu The Law of Scheduling (or The 5% Rule) http://www.educause.edu/blogs/lspitzner/law-scheduling-or-5-rule <p>There are two ways to deliver security awareness training: Scheduled or On Demand. Scheduled is what you think of for traditional training. A specific time and specific place are set for people to attend the training, such as an onsite presentation or a scheduled webcast. On Demand is training that allows people to take it when they want to, such as with Computer Based Training (CBT).</p><p><a href="http://www.educause.edu/blogs/lspitzner/law-scheduling-or-5-rule" target="_blank">read more</a></p> Mon, 22 Oct 2012 16:08:49 +0000 273725 at http://www.educause.edu Security and Privacy Sessions at EDUCAUSE 2012 http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012 <p>The <a href="http://www.educause.edu/annual-conference/2012">annual EDUCAUSE Conference</a> (November 6-9) offers a variety of <a href="http://www.educause.edu/annual-conference/agenda-and-program/search?filters=tid%3A44961">security and privacy-related sessions</a>. Whether you plan to join us in Denver or participate online, we encourage you to attend as many of these presentations as possible. Also remember to mark your calendar for the upcoming <a href="http://www.educause.edu/events/security-professionals-conference">Security Professionals Conference</a>, which will be held April 15-17, 2013 in St. Louis, Missouri, and Online. A <a href="http://www.educause.edu/events/security-professionals-conference/call-proposals">Call for Proposals </a>is currently out, with a November 13, 2012 deadline.</p><h4><em><strong>Tuesday, November 6, 2012</strong></em></h4><p><strong>Preconference Seminars (<em>separate registration required</em>)</strong></p><p><a href="http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012" target="_blank">read more</a></p> Tue, 16 Oct 2012 19:47:48 +0000 273154 at http://www.educause.edu The Real Reason the Human is the Weakest Link http://www.educause.edu/blogs/lspitzner/real-reason-human-weakest-link <p>Computers and mobile devices store, process, and transfer highly valuable information. As a result, your organization most likely invests a great deal of resources to protect them. Protect the end point and you protect the information. Humans also store, process, and transfer information. Employees are in many ways another operating system -- the HumanOS. Yet if you compare how much organizations invest in securing people compared to computers and mobile devices, you would be stunned at the difference. Let&#39;s take a look. Organizations typically invest the following in protecting an end device, including:</p><p><a href="http://www.educause.edu/blogs/lspitzner/real-reason-human-weakest-link" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/ncsam-sans-blog-sm.jpg">ncsam-sans-blog-sm.jpg</a></fieldset> Mon, 15 Oct 2012 14:35:29 +0000 272909 at http://www.educause.edu Security Awareness and Communication in the C-Suite http://www.educause.edu/library/resources/security-awareness-and-communication-c-suite <p>Drawing on more than 30 years of global experience, Dave Cullinane will share challenges that CISOs face while in the C-suite. This session will focus on how to <strong>advance executive understanding and awareness</strong> of recent challenges such as<strong> cloud security, privacy, compliance, BYOD, enterprise risk management</strong>, and other issues currently faced by campuses.</p><p>This webinar is part of National Cyber Security Awareness Month. Find out how you can participate in activities like this one throughout the month. <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-initiative">Learn more &#62;&#62;</a></p><p><a href="http://www.educause.edu/library/resources/security-awareness-and-communication-c-suite" target="_blank">read more</a></p> Thu, 04 Oct 2012 15:52:43 +0000 271831 at http://www.educause.edu Free SANS Securing the Human Videos in October for NCSAM http://www.educause.edu/blogs/vvogel/free-sans-securing-human-videos-october-ncsam <p>In support of National Cyber Security Awareness Month, SANS is offering <a href="https://www.securingthehuman.org/resources/ncsam">two free Securing The Human videos</a> during the month of October. The first video on E-mail and Phishing is available through October 14. Another video will be offered starting on October 15. Please feel free to share this link.</p><p>The SANS <a href="https://www.securingthehuman.org/">Securing The Human program</a> is a modular security awareness training program used by many colleges and universities.</p><p><a href="http://www.educause.edu/blogs/vvogel/free-sans-securing-human-videos-october-ncsam" target="_blank">read more</a></p> Tue, 02 Oct 2012 16:18:27 +0000 271524 at http://www.educause.edu National Cyber Security Awareness Month 2012 is HERE! http://www.educause.edu/blogs/vvogel/national-cyber-security-awareness-month-2012-here <p><em><strong>It&#8217;s that time of year again! October is National Cyber Security Awareness Month.</strong></em></p><p>Help us raise awareness with your faculty, staff, and students this October by promoting National Cyber Security Awareness Month (NCSAM).</p><p>We will start the month off with an EDUCAUSE Live! webinar on <strong>October 4</strong> (1-2 pm EDT). Register <a href="http://www.educause.edu/events/educause-live-security-awareness-and-communication-c-suite">here</a> and join Dave Cullinane, Chief Information Security Officer at eBay (retired) and Co-Founder of the Cloud Security Alliance, as he discusses &#8220;<a href="http://www.educause.edu/events/educause-live-security-awareness-and-communication-c-suite">Security Awareness and Communication in the C-Suite</a>.&#8221;</p><p>If you plan on holding an event in October, please share your plans and any applicable URL&#8217;s with this group or send an e-mail to <a href="mailto:security-council@educause.edu">security-council@educause.edu</a> so your institution&#39;s activities can be included with our list of 2012 campus events.</p><p><a href="http://www.educause.edu/blogs/vvogel/national-cyber-security-awareness-month-2012-here" target="_blank">read more</a></p> Mon, 01 Oct 2012 18:52:25 +0000 271438 at http://www.educause.edu Security Awareness on Social Media http://www.educause.edu/blogs/lspitzner/security-awareness-social-media <p>Social media is one of the fastest growing areas of online activity, and one of the fastest growing areas for malicious cyber activity. Even if your organization blocks access to social media sites, there are a tremendous number of risks you have to make your faculty, staff and students aware of. Here are some of the key points we recommend in any awareness program concerning social media sites.</p><p><a href="http://www.educause.edu/blogs/lspitzner/security-awareness-social-media" target="_blank">read more</a></p> Mon, 01 Oct 2012 14:23:38 +0000 271369 at http://www.educause.edu Guest Blogger for National Cyber Security Awareness Month http://www.educause.edu/blogs/vvogel/guest-blogger-national-cyber-security-awareness-month <p><a href="http://www.educause.edu/members/lance-spitzner">Lance Spitzner</a> (Training Director, SANS Securing The Human Program) will be guest blogging for EDUCAUSE during <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-initiative">National Cyber Security Awareness Month</a>&#160;(NCSAM) this October.</p><p>Read more about security awareness, security metrics, and communication skills on Lance&#39;s <a href="http://www.securingthehuman.org/blog">Securing the Human blog</a>.</p><p><a href="http://www.educause.edu/blogs/vvogel/guest-blogger-national-cyber-security-awareness-month" target="_blank">read more</a></p> Tue, 18 Sep 2012 20:01:22 +0000 270086 at http://www.educause.edu National Cyber Security Awareness Month http://www.educause.edu/ero/article/national-cyber-security-awareness-month <p>National Cyber Security Awareness Month, held each October, is the perfect time to raise awareness among students, faculty, staff, and administrators about ways they can be safer and more secure online. No one person, company, or agency is responsible for the security of the Internet; everyone must do his or her part. <em>Cybersecurity is our shared responsibility.</em></p><p><a href="http://www.educause.edu/ero/article/national-cyber-security-awareness-month" target="_blank">read more</a></p> Fri, 17 Aug 2012 21:35:40 +0000 267902 at http://www.educause.edu Prepare for National Cyber Security Awareness Month http://www.educause.edu/blogs/vvogel/prepare-national-cyber-security-awareness-month <h5><strong><em>Two Easy Ways to Increase Awareness</em></strong></h5><p>October is National Cyber Security Awareness Month (NCSAM). Below are two easy ways to increase information security awareness on your campus.</p><p><a href="http://www.educause.edu/blogs/vvogel/prepare-national-cyber-security-awareness-month" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/HEISC_FaceBookBanner2.jpg">HEISC_FaceBookBanner2.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/twitterBG.jpg">twitterBG.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/NCSAM%20logo.jpg">NCSAM logo.jpg</a></fieldset> Wed, 08 Aug 2012 20:00:04 +0000 267409 at http://www.educause.edu Podcast: Larry Conrad on IT Security Then and Now http://www.educause.edu/blogs/gbayne/podcast-larry-conrad-it-security-then-and-now <p><a href="http://www.educause.edu/members/larry-d-conrad">Larry D. Conrad</a> serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now.</p><p>Music: &#34;New Pop Wave&#34; by sebastian6</p><fieldset><legend>EDUCAUSE Podcast Sponsor</legend><a href="http://www.morantechnology.com"><img alt="Moran Technology Consulting" src="http://net.educause.edu/elements/images/MTC_logo.jpg" width="50%" /></a></fieldset><p>&#160;</p><p><a href="http://www.educause.edu/blogs/gbayne/podcast-larry-conrad-it-security-then-and-now" target="_blank">read more</a></p> 11:05 Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Tue, 17 Jul 2012 21:18:36 +0000 265867 at http://www.educause.edu Software-as-a-Service Email Security: Risk vs. Trust http://www.educause.edu/library/resources/software-service-email-security-risk-vs-trust <p>Many organizations would be interested in treating<strong> e-mail as a commodity</strong>&#8212;cutting costs and resource investments by<strong> outsourcing it to a software as a service (SaaS) </strong>provider. However, <strong>e-mail is a primary enterprise communication channel</strong> and often<strong> contains sensitive, proprietary content </strong>that needs to be protected. A significant amount of an enterprise&#39;s intellectual property is likely to be in the e-mail system&#39;s databases. Therefore, outsourcing e-mail to a third party raises important concerns about <strong>security and the risks associated with such an arrangement.</strong> This assessment provides enterprises with a framework to address these issues.</p><p><em>Citation for this Work</em>: Gartner, Inc., <em>Software-as-a-Service Email Security: Risk vs. Trust</em>, by Bill Pray, Dan Blum, 27 March 2012.</p><p><strong>ECAR Subscribers &#8212; You must be logged in to the EDUCAUSE website to access Gartner resources.</strong></p><p>Access to the report expires on May 9, 2013.</p><p><a href="http://www.educause.edu/library/resources/software-service-email-security-risk-vs-trust" target="_blank">read more</a></p> Tue, 29 May 2012 15:00:59 +0000 258278 at http://www.educause.edu Lapse in Cybersecurity Awareness Leads to Mistaken Plagiarism Charge http://www.educause.edu/ero/article/lapse-cybersecurity-awareness-leads-mistaken-plagiarism-charge <ul> <li><strong>Cybersecurity awareness</strong> rarely receives the attention from higher education needed to institute <strong>appropriate training</strong> and <strong>prevent security lapses</strong>, including those afflicting student works.</li> <li><strong>University administration</strong> is responsible for ensuring that correct policies and procedures are in place,<strong> including information assurance awareness </strong>and<strong> periodic compliance training </strong>for everyone associated with the academic network.</li> <li><strong>Four lessons learned</strong> in this case of a mistaken plagiarism charge can help others on campus, especially students, <strong>apply the security steps</strong> that will prevent confusion in ownership of data.</li></ul><p><a href="http://www.educause.edu/ero/article/lapse-cybersecurity-awareness-leads-mistaken-plagiarism-charge" target="_blank">read more</a></p> Wed, 09 May 2012 18:55:18 +0000 252680 at http://www.educause.edu House Homeland Security Subcmte. Hearing on Cyber Attacks http://www.educause.edu/blogs/jcummings/house-homeland-security-subcmte-hearing-cyber-attacks <p> The <a href="http://homeland.house.gov/subcommittee-oversight-investigations-and-management">Subcommittee on Oversight, Investigations, and Management</a> of the <a href="http://homeland.house.gov/">House Homeland Security Committee</a> held a hearing this afternoon entitled &quot;<a href="http://homeland.house.gov/hearing/subcommittee-hearing-america-under-cyber-attack-why-urgent-action-needed">America is Under Cyber Attack: Why Urgent Action is Needed</a>&quot; to highlight the extent of existing cyber threats to the nation and their impact, as well as the dangers of such threats expanding dramatically without a coherent national strategy. (Note that the hyperlink in the hearing title provides access to the archived video of the hearing as well as the written testimony of the witnesses and the opening statement of the subcommittee chair.)</p><p><a href="http://www.educause.edu/blogs/jcummings/house-homeland-security-subcmte-hearing-cyber-attacks" target="_blank">read more</a></p> Tue, 24 Apr 2012 21:07:50 +0000 252587 at http://www.educause.edu Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices http://www.educause.edu/events/enterprise-it-leadership-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are in this process and share experiences such as building mobile device security awareness into the training program and managing technology implementation options. This session will offer ideas, security awareness content, an implementation checklist, and sample policy statements for those campuses just embarking on developing and implementing a smart device security strategy.<p><a href="http://www.educause.edu/events/enterprise-it-leadership-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices" target="_blank">read more</a></p> Tue, 31 Jan 2012 20:17:39 +0000 245912 at http://www.educause.edu Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices http://www.educause.edu/events/security-professionals-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are in this process and share experiences such as building mobile device security awareness into the training program and managing technology implementation options. This session will offer ideas, security awareness content, an implementation checklist, and sample policy statements for those campuses just embarking on developing and implementing a smart device security strategy.<p> </p><p><b>Tweet your thoughts and reflections using this unique session hashtag: #MobileLions</b></p><p><a href="http://www.educause.edu/events/security-professionals-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices" target="_blank">read more</a></p> Tue, 31 Jan 2012 16:48:36 +0000 245823 at http://www.educause.edu Capture the Flag as a Tool for Training and Teaching http://www.educause.edu/events/security-professionals-conference/capture-flag-tool-training-and-teaching Augmenting classroom-based technical security training with hands-on capture the flag (CTF) environments enables participants to develop information security skills and to put theoretical knowledge to use in a controlled, purpose-built environment. Learning-by-doing, also known as experiential learning, is proven to be a very effective method to train technically inclined staff members, as concepts are put into practice immediately and consequences are demonstrated clearly. This presentation will provide an overview of using CTF as a teaching tool and show how system administrators and software developers alike have taken an immediate liking to it.<p><a href="http://www.educause.edu/events/security-professionals-conference/capture-flag-tool-training-and-teaching" target="_blank">read more</a></p> Mon, 30 Jan 2012 15:48:15 +0000 245645 at http://www.educause.edu Phishing Ourselves to Raise Awareness http://www.educause.edu/events/security-professionals-conference/phishing-ourselves-raise-awareness <p>Emory University and Healthcare changed phishing awareness approaches in 2010 from using traditional e-mail and web-based awareness messages to employing a third-party service to send phishing e-mails to everyone on campus. We&#39;ve tracked the results of these efforts both over time and between a number of different demographic variables. We&#39;ll discuss notable trends and what level of value we feel we obtained from this approach. We&#39;ll also cover the technical and nontechnical challenges we encountered and how we addressed them.</p><p><a href="http://www.educause.edu/events/security-professionals-conference/phishing-ourselves-raise-awareness" target="_blank">read more</a></p> Mon, 30 Jan 2012 15:48:12 +0000 245644 at http://www.educause.edu Seminar 02Z - Engage! Creating a Meaningful Security Awareness Program<br><b>PLEASE NOTE: Separate registration and fee are required to attend this seminar.<b/> http://www.educause.edu/events/security-professionals-conference/seminar-02z-engage-creating-meaningful-security-awareness-programplease-note-separat This session will help attendees identify available resources and tools and determine the steps needed to create an engaging security awareness program. We'll share how to integrate social media, video, and other resources in an effort to reach a variety of audiences. We'll also discuss how to leverage security incidents to create opportunities for engagement with your community. We'll conclude the session by helping you plan a series of targeted activities for a high-profile event such as the National Cyber Security Awareness Month (October).<p><a href="http://www.educause.edu/events/security-professionals-conference/seminar-02z-engage-creating-meaningful-security-awareness-programplease-note-separat" target="_blank">read more</a></p> Mon, 23 Jan 2012 23:19:08 +0000 245323 at http://www.educause.edu HEISC Town Hall Webinar: 2012-2013 Strategic Plan http://www.educause.edu/library/resources/heisc-town-hall-webinar-2012-2013-strategic-plan <p>In this webinar, the Higher Education Information Security Council (HEISC) discussed the following topics;&#160;</p><ul> <li>Information security changes in the past 10 years</li> <li>Ongoing challenges for security practitioners</li> <li>HEISC strategic plan (2012-2013)</li> <li>Vision</li> <li>Mission</li> <li>Goals &#38; objectives</li> <li>HEISC working group updates</li> <li>What can you do?</li></ul><p><a href="http://www.educause.edu/library/resources/heisc-town-hall-webinar-2012-2013-strategic-plan" target="_blank">read more</a></p> Thu, 12 Jan 2012 16:37:39 +0000 244576 at http://www.educause.edu