How to prevent a whale phishing attack
Attackers are taking advantage of the pandemic, with work-from-home orders, and of the potential disruption to chains of command, say UB guest columnists David Carson and Harvey Gannon. Here's Flagler College's story of a thwarted phishing attempt and seven ways for any institution to protect itself.
IT risk management: Is your WISP policy document up to date?
Colleges and universities are facing a constant onslaught of new risk as well as a growing number of compliance laws and regulatory mandates. That’s why keeping the Written Information Security Program policy document up to date is important for protecting all data, says UB guest columnist and UB Tech featured speaker Nicholas M. Tella, director of information security at Johnson & Wales U.
How to secure data institutionwide
UB guest columnist and UB Tech featured speaker Damian Doyle addresses how to enable faculty and staff to easily work with data, using their preferred tools, while maintaining security. Doyle is assistant vice president of enterprise infrastructure solutions at the University of Maryland, Baltimore County.
Cybersecurity: Do you have the right plan in place?
Retired Brig. Gen. Charles Shugg of the U.S. Air Force answers the top three questions higher ed leaders ask when addressing cybersecurity risk management on campus. A UB guest columnist and UB Tech featured speaker, Shugg is chief operating officer and partner for the Sylint Group Inc.
Higher Ed Cybersecurity Strategy: Taking a Holistic Approach
In this web seminar, presenters discussed the higher ed cyberthreat landscape, how the UC system is managing cyber risk across all campuses and health care facilities, and some key strategies for an institution of any size to detect and mitigate cyberthreats. Sponsored content by FireEye.