You are here

Cybersecurity

The University of Michigan’s very decentralized campus means it has multiple IT departments, numerous technologies and plenty of cloud applications. “We basically use everything you can think of when it comes to the cloud,” says Don Welch, chief information security officer. “Colleges here have their own relationships with providers, and their own strategies with information storage. So it’s a big task to set central policies, but it’s important to take on that role.”

Joe Adams, Interim President and CEO and Vice President of Research and Cyber Security, Merit Network

A 2013 survey of institutions that have a formal policy covering user-provisioned technologies. (Click to enlarge)

Controlling bandwidth is just one reason why colleges and universities have adopted BYOD policies. Improving computer security, providing reliable internet access for classroom work, and simply letting faculty, staff and students use their favorite devices have driven wider acceptance of BYOD strategies.

While each campus is unique, an audit may reveal surprising  information about the many places credit cards are accepted as  payment. (Click to enlarge)

Those involved in securing credit card data used in higher ed transactions need to be aware that banks are beginning to exercise greater scrutiny over these activities. It’s more important than ever that campus officials get a firm hold on, and a clear understanding of, this aspect of their operations.

Electronic records are helping to solve storage problems for Rebecca Turner of Central New Mexico Community College, where 4,000 boxes of personnel files and other records must be retained for up to 55 years.

Around 4,000 boxes of paper records fill the shelves in Central New Mexico Community College’s storage area. And many of these boxes—those containing employee personnel files, for example—must remain in storage for up to 55 years before they can be destroyed.

It’s a big reason why CNMCC has embraced electronic records management, says Rebecca Turner, records and property control manager for the Albuquerque college.

Thanks to the use of image capturing verification processes,  students and graduates of Shenandoah U in Virginia need not worry about the accuracy of their electronic transcripts.

Despite the benefits of electronic document management systems, college and university compliance efforts can be undermined by faulty management.

Providers were asked to share their thoughts on what higher ed institutions aren’t paying enough attention to when it comes to compliance and electronic documents/records management. Here’s what they told us:

The intensification of cyberattacks against universities and colleges means institutions need more than just clever passwords and the latest antivirus software to protect themselves from today’s more powerful hackers.

There are a wide variety of products that can automatically control who’s using a network, determine what kind of security their devices have, and even fool hackers into thinking they have successfully infiltrated a computer system.

(Getty Images.com/Patrick George) Today’s hackers are now being deployed around the clock to steal intellectual property, sensitive research, and personal information.

The lone-wolf hacker creating nuisance viruses in a basement has been replaced by sophisticated foreign governments and organized crime rings as the top cybersecurity threat to colleges and universities.

Today’s hackers are now being deployed around the clock to steal intellectual property, sensitive research, and personal information, potentially costing colleges and universities millions of dollars and badly damaging their reputations.

Pages