Whether you’re a Newb, a Wizard or even a Ninja, a cybercriminal can take all the fun out of gaming by luring you into downloading software or clicking a link that infects your computer and exposes your personal info. You can still enjoy gaming with players across the globe by following basic security practices like applying strong passwords, keeping your system current and using common sense (don’t click on weird sh*t).
Author: Beth Varcho
On June 14, OCIO will be enabling the new Box user interface. We’ve published an article in our Knowledge Base, article KB05374 with resources for navigating the new design. You can preview this new interface by enabling it for your BuckeyeBox account now.
The updated interface is designed to create a simpler, more user-friendly experience. Improvements include:
People lose mobile devices. Sometimes they get stolen. They can also be hacked. So we need Enterprise Mobility Management (EMM), and Enterprise Security has reviewed solutions that can work for a widely disparate group of business units, colleges, faculty and staff.
By now you should have seen the news of widespread ransomware attacks. It is projected to have affected users in more than 150 countries.
In this attack ransomware called WannaCry was emailed to users. When opened, the malware locked files on their computers. Older versions of Microsoft Windows systems that have not applied security patches were affected.
The Next Step for Phone, IM, Virtual Meetings and More
It all started with Microsoft Lync. University staff wanted an instant messaging platform and our phone systems were due for an update, so the Lync implementation made sense on many levels. While Lync is still being used by many customers across campus, Skype for Business is being rolled out to these customers one department at a time. Here’s what you need to know when Skype for Business comes to your department.
Can CRM work at Ohio State? It’s a reasonable question. For starters, in an organization this big, very few initiatives are simple. And you may have heard that Customer Relationship Management (CRM) initiatives – especially at large organizations – are notorious for failing. We knew all of this when discussions first began at Ohio State, and we didn’t want to become just another statistic.
According to a Symantec Security Threat Report, in 2016 there were 20 data breaches in higher education, exposing the personal information of approximately 5 million people. Those figures illuminate a grim reality -- it only takes the loss of one person’s user name and password to expose the private information of thousands, or even millions, of other system users.
The Ohio Higher Education Computing Council (OHECC) brings together information technology (IT) organizations and professionals from institutions of higher education in the state of Ohio. This year Ohio State is hosting the annual OHECC conference on May 17-19, giving central Ohio IT professionals the opportunity to attend without the added cost of travel, meals and accommodations.
5 Reasons to Choose It and Use It
Not only do you have a choice in cloud storage and collaboration services, but more choices are also being added to the market on a regular basis. They include options like Dropbox, Google Drive and Box. As cloud storage becomes more advanced, more products will undoubtedly be added to the mix.
Universities have a responsibility to numerous agencies of oversight; federal standards for universities may come from commerce or health agencies and from research, education and industry groups. Chief Information Security Officers (CISO) have the unenviable role of meeting all these requirements, while simultaneously keeping systems and information safe.