According to a Symantec Security Threat Report, in 2016 there were 20 data breaches in higher education, exposing the personal information of approximately 5 million people. Those figures illuminate a grim reality -- it only takes the loss of one person’s user name and password to expose the private information of thousands, or even millions, of other system users.
Author: Beth Varcho
The Ohio Higher Education Computing Council (OHECC) brings together information technology (IT) organizations and professionals from institutions of higher education in the state of Ohio. This year Ohio State is hosting the annual OHECC conference on May 17-19, giving central Ohio IT professionals the opportunity to attend without the added cost of travel, meals and accommodations.
5 Reasons to Choose It and Use It
Not only do you have a choice in cloud storage and collaboration services, but more choices are also being added to the market on a regular basis. They include options like Dropbox, Google Drive and Box. As cloud storage becomes more advanced, more products will undoubtedly be added to the mix.
Universities have a responsibility to numerous agencies of oversight; federal standards for universities may come from commerce or health agencies and from research, education and industry groups. Chief Information Security Officers (CISO) have the unenviable role of meeting all these requirements, while simultaneously keeping systems and information safe.
SACM stands for Service Asset and Configuration Management, and the Office of the Chief Information Officer (OCIO) has spent the past couple years working through the process. Specifically, we’ve cataloged what is on each of our servers, how each one is supported, and what interrelationships it has with other applications and services. The key deliverable of this work is a configuration management database (CMDB) that stores all of this information for easy retrieval and updates.
The gender gap is a continuing area of focus for higher education, and with good reason considering industry trends. According to Fortune Magazine, the number of women majoring in computer science has decreased over time from 35% in 1990 to only 26% in 2013.
Accessible software is good for everyone, not just people with disabilities. Keeping that in mind, and to remain true to our commitment to diversity, our approach to accessibility is strongly related to universal design. Universal design means creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations.
On March 31, our Chief Information Security Officer Helen Patton will be a featured speaker at Attorney General Mike DeWine’s CyberOhio Business Summit. Helen’s session is entitled, “Security Frameworks: How to Use Them to Improve Business Outcomes.” It will cover common cybersecurity frameworks, with practical details including:
Meet Security Requirements Using OCIO Offsite Storage and Colocation
If you need to strengthen your data center and disaster recovery posture, the OCIO offers offsite storage and colocation services that can help you achieve your goals.
The Ohio State Information Security Control Requirement (ISCR) outlines best-practice security control requirements that we are all striving to meet. Using OCIO offsite storage and colocation services can accelerate your time table to meet ISCR, give you an immediate risk reduction, improve quality and increase capacity.
Enterprise Security has taken a number of steps to cultivate the cybersecurity professionals of tomorrow. Most recently, the team helped host Cooltechgirls’ “Think Like a Hacker” event in early December.
After a short program explaining the security aspects of geocaching, participants worked through a cybersecurity activity that challenged them to use their newly-gained knowledge to tackle a problem similar to one that a security professional might need to solve in real life.