According to a Symantec Security Threat Report, in 2016 there were 20 data breaches in higher education, exposing the personal information of approximately 5 million people. Those figures illuminate a grim reality -- it only takes the loss of one person’s user name and password to expose the private information of thousands, or even millions, of other system users.
5 Reasons to Choose It and Use It
Not only do you have a choice in cloud storage and collaboration services, but more choices are also being added to the market on a regular basis. They include options like Dropbox, Google Drive and Box. As cloud storage becomes more advanced, more products will undoubtedly be added to the mix.
SACM stands for Service Asset and Configuration Management, and the Office of the Chief Information Officer (OCIO) has spent the past couple years working through the process. Specifically, we’ve cataloged what is on each of our servers, how each one is supported, and what interrelationships it has with other applications and services. The key deliverable of this work is a configuration management database (CMDB) that stores all of this information for easy retrieval and updates.
Accessible software is good for everyone, not just people with disabilities. Keeping that in mind, and to remain true to our commitment to diversity, our approach to accessibility is strongly related to universal design. Universal design means creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations.
Do you know that feeling you get when you’re driving your car and the “check engine” light comes on? Perhaps it’s just time for an oil change, which maybe can be delayed. Perhaps it is something more serious that requires immediate attention. Often there is no way to be sure without consulting a professional. What a pain.
A new type of phishing scam is targeting online shoppers, reminding us to be aware of how we interact with websites and that phishing attacks can come from many sources, not just email!
The Enterprise Security team's mission is to improve the security awareness and profile of the university. We wanted to make you aware of this scam that could cause you loss as a consumer.
Meet Security Requirements Using OCIO Offsite Storage and Colocation
If you need to strengthen your data center and disaster recovery posture, the OCIO offers offsite storage and colocation services that can help you achieve your goals.
The Ohio State Information Security Control Requirement (ISCR) outlines best-practice security control requirements that we are all striving to meet. Using OCIO offsite storage and colocation services can accelerate your time table to meet ISCR, give you an immediate risk reduction, improve quality and increase capacity.
In early November OCIO introduced an automated process that will make it much faster to set up student employee (S) and organizational email accounts.
The Office of the Chief Information Officer’s Networking and Enterprise Security teams are collaborating to modify how devices compromised by malware and other security threats are suspended from OCIO’s wireless networks. Affected networks include osuwireless, WiFi@OSU and eduroam.
Previously, Ohio State accounts were prevented from authenticating on osuwireless and eduroam from any device regardless of which device had been compromised.
More than a year ago we kicked off the first phase of the course enrollment data warehouse implementation, using BuckIQ to make it easier and more efficient to adjust classes when student interest exceeds section capacity.