You are here

Articles: Security

Landscaping strives to achieve the following four goals as they prioritize a never-ending list of pressing everyday tasks as well as find time and resources for more intensive projects.

Campuses want to tighten security and turn information into action. This has caused an unprecedented surge in demand for safety and data personnel.

Source: Alcohol and Other Drug Use at UMass Amherst Survey, 2012

Continued binge drinking and destructive student behavior have driven higher ed leaders to refine off-campus behavior policies.

BLUE LIGHT BEACON—Kansas State University Police monitor phone call boxes located throughout the campus.  Besides seeking help in an emergency or reporting other incidents, the community is also encouraged the use the boxes for wayfinding assistance. (Cindy Hollingsworth).

Mobile apps, text alerts, personal panic buttons and other new technologies give students more ways to communicate safety concerns.

What role does visible security technology play in deterring campus crime and giving students, prospective students/families, and others peace of mind?

SAVE A LIFE—Bridgewater State Police Chief David Tillinghast kicked off the university’s Narcan program, which provides training on use of the overdose-reversal drug. It is stored in 50 public places across campus.

Training is underway at colleges and universities to teach more people how to administer the drug that reverses opioid overdoses.

In his trainings with students, faculty and staff, Detective Sgt. Robert McEvoy, of the Bridgewater State University Police in Massachusetts, details the following signs of an opioid overdose.

These signs are:


Link to main story: Colleges train to reverse opioid overdoses


As global collaboration increases in higher education, so do concerns about violence abroad.

Meghan Hollowell is dean of College Support Services at The Christ College of Nursing and Health Sciences.

From IT support staff to upper-level administration, everyone wants to protect student data from the hackers who hope to pilfer it.

The ongoing wave of school violence has forced higher ed to enhance emergency-response training in teacher education programs.

Source: National Behavioral Intervention  Team Association; 2015 survey

After the Virginia Tech tragedy, colleges began to build teams of administrators and faculty to better recognize and support distraught individuals on campus.

Joanne Martin, a member of the Women in Technology International Hall of Fame, will share her perspectives as a keynote speaker in June at the UBTech 2018 conference in Las Vegas.

As the former chief information security officer and vice president for IT risk at IBM, Joanne Martin ensured the firm’s information assets were protected.

Q: What can higher ed institutions do to best protect themselves from technical vulnerabilities that most people would not expect are vulnerabilities (for example, wireless printers)?

“The most important thing organizations can do is ensure they have visibility into every layer of their IT environment—from the network perimeter all the way down to the endpoints. The more an IT team knows about what is connected to the network, the more effectively they can secure it.”

—Joe Aronow, product architect, Cisco Meraki

Quiz: Is your cybersecurity policy effective?

At the Internet of Things Village of the DEF CON security conference in 2016, hacking contests revealed nearly 50 vulnerabilities in 23 devices from 21 manufacturers.

Higher education happens to be a leading target for ransomware attacks, in part because of our open approach to the sharing of information and our embrace of different cultures and peoples.

Pages