Higher Education & Information Security
5.1K views | +0 today
Follow
Higher Education & Information Security
Information Security and Cybersecurity in Higher Education
Your new post is loading...
Your new post is loading...
Rescooped by Higher Ed InfoSec Council from Higher Education & Privacy
Scoop.it!

How Apple iOS 8 eases some privacy concerns

How Apple iOS 8 eases some privacy concerns | Higher Education & Information Security | Scoop.it
When Apple releases iOS 8 in the fall, corporate employees who use their iPhones and iPads for work will have better privacy protection when walking in places with Wi-Fi networks.

 

Another privacy feature being added to iOS 8 is to make DuckDuckGo the default search engine in the Safari browser. DuckDuckGo is considered more secure than competitors because it does not track users or collect and store personal information.

more...
No comment yet.
Rescooped by Higher Ed InfoSec Council from Higher Education & Privacy
Scoop.it!

How Well Do Tech Companies Protect Your Data From Snooping?

How Well Do Tech Companies Protect Your Data From Snooping? | Higher Education & Information Security | Scoop.it
We looked at 15 top companies and services that handle your email or store your data every day to see what steps they take to keep it from prying eyes. See how they stack up.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Project Eavesdrop: What Passive Surveillance Collects

Project Eavesdrop: What Passive Surveillance Collects | Higher Education & Information Security | Scoop.it
Over the past year, we've learned a lot about what the National Security Agency can do. Our technology correspondent allowed his phone and Internet activities to be monitored to see what was revealed.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Hacking the Competition

Hacking the Competition | Higher Education & Information Security | Scoop.it

During the summer of 2010, Symplicity Corporation knew it wasn’t keeping up with the competition.

 

Trying to stand out in the small world of technology companies that supply colleges with software to track student disciplinary cases, Symplicity CEO Ariel Manuel Friedler noticed more colleges and universities picking its main competitor, Maxient, because its software “feels like a website,” he emailed to employees. “We are bleeding ... we have lost close to a dozen [clients] this year.”

 

To win back colleges, Symplicity’s top leader and two other employees hacked their way into Maxient’s servers to stock up on the competitor’s product design, new features and software layout.

Higher Ed InfoSec Council's insight:

US Department of Justice Press Release: http://www.justice.gov/usao/vae/news/2014/05/20140521friedlernr.html

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Large Electric Utilities Earn High Security Scores

Large Electric Utilities Earn High Security Scores | Higher Education & Information Security | Scoop.it
Critical infrastructure is a big target for attack, but new data shows some operators in that industry suffer fewer security incidents than other industries.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Assessing Cybersecurity Regulations | The White House

Assessing Cybersecurity Regulations | The White House | Higher Education & Information Security | Scoop.it
The threat to our systems and information is dynamic and rapidly evolving; we must build equally agile and responsive capabilities not bound by outdated and inflexible rules and procedures.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Just in Time Research: Data Breaches in Higher Education | EDUCAUSE.edu

Just in Time Research: Data Breaches in Higher Education | EDUCAUSE.edu | Higher Education & Information Security | Scoop.it

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this free report compares higher ed to other sectors to help you assess risk.

more...
No comment yet.
Rescooped by Higher Ed InfoSec Council from Higher Education & Privacy
Scoop.it!

Senators Intend to Amend Federal Student Privacy Law

Senators Intend to Amend Federal Student Privacy Law | Higher Education & Information Security | Scoop.it
To beef up protections for the personal information about students that schools may share with technology vendors, two prominent federal senators propose to amend a longstanding federal law on education privacy.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

How to optimize your security budget

How to optimize your security budget | Higher Education & Information Security | Scoop.it

Security budgets are on the rise, yet secure results aren't. It’s time for security teams to change that for the better.

 

"The good news is that security budgets are rising broadly. The bad news? So are successful attacks. Perhaps that’s why security budgets averaging $4.3 million this year represent a gain of 51% over the previous year – and that figure is nearly double the $2.2 million spent in 2010 – all according to our most recent Global Information Security Survey, conducted by PricewaterhouseCoopers."

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

A Security Framework Tailor-Made for Higher Ed

A Security Framework Tailor-Made for Higher Ed | Higher Education & Information Security | Scoop.it

This free spreadsheet tool from EDUCAUSE can help identify gaps in a college or university security profile and kick-start a security conversation on campus. Learn more at http://www.educause.edu/security/assessment-tool

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Role Reversal: CIO Reports to CISO

Role Reversal: CIO Reports to CISO | Higher Education & Information Security | Scoop.it
In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?

 

Today, when cyberthreats are pervasive, should securing critical information assets be put above the operation and managing of information technology?


Booz Allen Hamilton, the business, military and government management consultancy, seems to thinks so. Its CIO reports to its CISO.

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Indiana U. Puts IT and Safety Under One Umbrella

Indiana U. Puts IT and Safety Under One Umbrella | Higher Education & Information Security | Scoop.it
As police departments and other security functions depend more and more on digital technologies, bringing them together just made sense, officials say.

 

Even as campus functions like building access and emergency response become increasingly dependent on institutions’ information-technology infrastructures, physical security and information technology remain administratively separate almost everywhere. But at Indiana University, officials are nearly five years into an unusual experiment, and they say it’s yielding good results.

 

The undertaking began when President Michael A. McRobbie set in motion an overhaul of the university administration, which included bundling systemwide physical security and information security into the hands of one associate vice president, Mark S. Bruhn. He reports to both the executive vice president for university academic affairs and the vice president for information technology.

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Windows XP support end: 10 steps to cut security risks

Windows XP support end: 10 steps to cut security risks | Higher Education & Information Security | Scoop.it
Microsoft may have ended support for Windows XP but those left clinging to the aged operating system still have some ways of managing the risks.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

AIG cyber insurance covers bodily harm

AIG cyber insurance covers bodily harm | Higher Education & Information Security | Scoop.it
AIG said it's expanding cyber insurance to cover property damage and bodily injury. It's another sign the digital and physical worlds have merged.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

4 Universities Band Together to Share and Protect Digital Resources

4 Universities Band Together to Share and Protect Digital Resources | Higher Education & Information Security | Scoop.it

The online-education boom has made technology vendors powerful. So powerful, in fact, that some university officials say it’s getting harder and harder to update their technology without placing themselves under the sway of outside companies.

 

Now four major research universities are trying to promote strength in numbers. They are creating a consortium, called Unizin, that they hope will help member institutions innovate on their own terms.

 

“Unizin is a strategic move by universities to assert greater control and influence over the digital-learning landscape than would otherwise be possible by any single institution,” the founders write in a news release. The four institutions are Colorado State University, Indiana University, the University of Florida, and the University of Michigan.

 

Unizin will negotiate contracts with technology vendors for products and services that many universities already buy individually. But instead of implementing the technologies locally, member institutions will get a set of “sewn-together services” from Unizin in exchange for dues, says Bradley C. Wheeler, vice president for information technology at Indiana.

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Cyberattack Insurance a Challenge for Business

Cyberattack Insurance a Challenge for Business | Higher Education & Information Security | Scoop.it
More businesses are buying policies, but losses are difficult to quantify because attackers are constantly getting more advanced.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Email encryption in transit -- via Google

Email encryption in transit -- via Google | Higher Education & Information Security | Scoop.it
Many email providers don’t encrypt messages while they’re in transit. When you send or receive emails with one of these providers, these messages are as open to snoopers as a postcard in the mail.
more...
No comment yet.
Rescooped by Higher Ed InfoSec Council from Higher Education & Privacy
Scoop.it!

Google bows to EU privacy ruling

Google bows to EU privacy ruling | Higher Education & Information Security | Scoop.it

A landmark “right to be forgotten” ruling against Google in Europe risks damaging the next generation of internet start-ups and strengthening the hand of repressive governments looking to restrict online communications, Larry Page, the search company's chief executive officer, has warned.

more...
No comment yet.
Rescooped by Higher Ed InfoSec Council from Higher Education & Privacy
Scoop.it!

Door by Door, Colleges Install Systems for Online Control of Building Access

Door by Door, Colleges Install Systems for Online Control of Building Access | Higher Education & Information Security | Scoop.it

Spurred by a desire to better control who is moving in and out of campus facilities, colleges are adopting sophisticated online access systems at a steady clip. The systems, which support arrays of hard-wired and wireless locks, are being applied to interior doors, such as those in residence halls and labs, in addition to exterior doors. In some places they are being installed in concert with other security features, like video surveillance technology. The migration is such that traditional keys on college campuses could soon become as quaint as typewriters.

 

Online building-access systems deliver a certain "wow" factor. They allow administrators to monitor and control individual doors using a dedicated workstation or browser-based interface. User-friendly features include doors that can be unlocked by contactless "tap" cards and mobile devices.

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Trust the Education Department With a Student Database? Not Likely.

Trust the Education Department With a Student Database? Not Likely. | Higher Education & Information Security | Scoop.it

A proposal for a detailed federal database of all college students has once again surfaced, the brainchild of researchers who believe that a major purpose of colleges is to serve as data sources for their own studies, and of policy wonks who think that any nationwide effort worth doing must be owned and operated by the federal government. The proposed database is a bad idea for at least three reasons...

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Time to Modernize Thinking, Technology in Fighting Malware

Time to Modernize Thinking, Technology in Fighting Malware | Higher Education & Information Security | Scoop.it
A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious software, experts say.
more...
albert oaten's curator insight, May 14, 2014 2:06 PM

#startups #fundraising #M&A #LifeScience #CFOs too careless w their trade secrets, Biz models, client trust:  can cost millions to develop, millions if you lose it

Scooped by Higher Ed InfoSec Council
Scoop.it!

10 talking points about cybersecurity and your business

10 talking points about cybersecurity and your business | Higher Education & Information Security | Scoop.it

PwC, Interbrand, Symantec and the Institute of Risk Management talk security, crisis control and planning for the ‘absolute worst’.

 

"It’s the large-scale cybersecurity breaches that make the headlines:Target, Adobe, Sony and the recent concerns about the Heartbleed bug being obvious examples.


Yet businesses of every size are grappling with how to secure their networks, devices and data. A roundtable this week in London organised by Symantec – disclosure: the company sponsors The Guardian's Secure + Protect blog – explored the issues.

 

Participants included Graham Hales, global CMO at Interbrand; Richard Horne, partner at PricewaterhouseCoopers; Richard Anderson, chairman of the Institute of Risk Management; and Sian John, senior cyber security strategist at Symantec. It was moderated by Tim Weber, director at Edelman.

 

Here are 10 of the main talking points from the event"

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Are Hackathons the Classrooms of Tomorrow? My journey to the frontier of education

Are Hackathons the Classrooms of Tomorrow? My journey to the frontier of education | Higher Education & Information Security | Scoop.it

Last weekend I unexpectedly stumbled into a learning community. It was at a hackathon on my campus called VT Hacks. I was familiar with these types of events at places like Facebook and even inacademic libraries, but this was my first opportunity to attend one.

 

I knew people would be writing code, but I didn’t anticipate the wide range of hardware that they would be programing: quadcopters, glass, Kinect, iBeacons, 3D printers, leap motion,Pebble watches, Fitbits, oculus Rifts, and Raspberry pi. It was eye opening.

more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

Four of the newest (and lowest) Social Engineering scams

Four of the newest (and lowest) Social Engineering scams | Higher Education & Information Security | Scoop.it
Social engineering thugs have reached new lows, as gangs play on users’ fears of privacy loss, theft and even death.
more...
No comment yet.
Scooped by Higher Ed InfoSec Council
Scoop.it!

The worst data breaches of 2014…so far (Q1)

The worst data breaches of 2014…so far (Q1) | Higher Education & Information Security | Scoop.it

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker cyberattacks, stolen laptops or dumb mistakes. Here's the worst of it.

more...
No comment yet.