Cybersecurity

How safe are your digital documents?

Electronic document management systems make it easier to comply with digital content regulations, but complacency can threaten effectiveness

Around 4,000 boxes of paper records fill the shelves in Central New Mexico Community College’s storage area. And many of these boxes—those containing employee personnel files, for example—must remain in storage for up to 55 years before they can be destroyed.

It’s a big reason why CNMCC has embraced electronic records management, says Rebecca Turner, records and property control manager for the Albuquerque college.

Document management strategies to live by—and pitfalls to avoid

Providers share thoughts on what higher ed isn’t paying enough attention to when it comes to electronic documents

Despite the benefits of electronic document management systems, college and university compliance efforts can be undermined by faulty management.

Providers were asked to share their thoughts on what higher ed institutions aren’t paying enough attention to when it comes to compliance and electronic documents/records management. Here’s what they told us:

Cyberattacks on the rise in higher education

Foreign governments and organized crime targeting institutions’ most sensitive information.

The lone-wolf hacker creating nuisance viruses in a basement has been replaced by sophisticated foreign governments and organized crime rings as the top cybersecurity threat to colleges and universities.

Today’s hackers are now being deployed around the clock to steal intellectual property, sensitive research, and personal information, potentially costing colleges and universities millions of dollars and badly damaging their reputations.

Colleges need protection beyond antivirus

Products can control who’s using a network, determine what kind of security their devices have, and even fool hackers.

The intensification of cyberattacks against universities and colleges means institutions need more than just clever passwords and the latest antivirus software to protect themselves from today’s more powerful hackers.

There are a wide variety of products that can automatically control who’s using a network, determine what kind of security their devices have, and even fool hackers into thinking they have successfully infiltrated a computer system.

Matt Zalaznick's picture

University of Michigan warns against email scams as some direct deposit accounts are compromised

University of Michigan is experiencing a newly sophisticated type of cyber attack: An email scam that attempts to get employees' passwords, gain access to their personal information and redirect their direct deposits.

Read more »