People lose mobile devices. Sometimes they get stolen. They can also be hacked. So we need Enterprise Mobility Management (EMM), and Enterprise Security has reviewed solutions that can work for a widely disparate group of business units, colleges, faculty and staff.
The Next Step for Phone, IM, Virtual Meetings and More
It all started with Microsoft Lync. University staff wanted an instant messaging platform and our phone systems were due for an update, so the Lync implementation made sense on many levels. While Lync is still being used by many customers across campus, Skype for Business is being rolled out to these customers one department at a time. Here’s what you need to know when Skype for Business comes to your department.
Can CRM work at Ohio State? It’s a reasonable question. For starters, in an organization this big, very few initiatives are simple. And you may have heard that Customer Relationship Management (CRM) initiatives – especially at large organizations – are notorious for failing. We knew all of this when discussions first began at Ohio State, and we didn’t want to become just another statistic.
According to a Symantec Security Threat Report, in 2016 there were 20 data breaches in higher education, exposing the personal information of approximately 5 million people. Those figures illuminate a grim reality -- it only takes the loss of one person’s user name and password to expose the private information of thousands, or even millions, of other system users.
5 Reasons to Choose It and Use It
Not only do you have a choice in cloud storage and collaboration services, but more choices are also being added to the market on a regular basis. They include options like Dropbox, Google Drive and Box. As cloud storage becomes more advanced, more products will undoubtedly be added to the mix.
SACM stands for Service Asset and Configuration Management, and the Office of the Chief Information Officer (OCIO) has spent the past couple years working through the process. Specifically, we’ve cataloged what is on each of our servers, how each one is supported, and what interrelationships it has with other applications and services. The key deliverable of this work is a configuration management database (CMDB) that stores all of this information for easy retrieval and updates.
Accessible software is good for everyone, not just people with disabilities. Keeping that in mind, and to remain true to our commitment to diversity, our approach to accessibility is strongly related to universal design. Universal design means creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations.
Do you know that feeling you get when you’re driving your car and the “check engine” light comes on? Perhaps it’s just time for an oil change, which maybe can be delayed. Perhaps it is something more serious that requires immediate attention. Often there is no way to be sure without consulting a professional. What a pain.
A new type of phishing scam is targeting online shoppers, reminding us to be aware of how we interact with websites and that phishing attacks can come from many sources, not just email!
The Enterprise Security team's mission is to improve the security awareness and profile of the university. We wanted to make you aware of this scam that could cause you loss as a consumer.
Meet Security Requirements Using OCIO Offsite Storage and Colocation
If you need to strengthen your data center and disaster recovery posture, the OCIO offers offsite storage and colocation services that can help you achieve your goals.
The Ohio State Information Security Control Requirement (ISCR) outlines best-practice security control requirements that we are all striving to meet. Using OCIO offsite storage and colocation services can accelerate your time table to meet ISCR, give you an immediate risk reduction, improve quality and increase capacity.