University of Michigan warns against email scams as some direct deposit...
Top NewsAnn Arbor.comUniversity of Michigan is experiencing a newly sophisticated type of cyber attack: An email scam that attempts to get employees' passwords, gain access to their personal...
View ArticleColleges need protection beyond antivirus
Products can control who’s using a network, determine what kind of security their devices have, and even fool hackers.Author: Matt ZalaznickUniversity Business, October 2013The intensification of...
View ArticleCyberattacks on the rise in higher education
Foreign governments and organized crime targeting institutions’ most sensitive information. Author: Matt ZalaznickUniversity Business, October 2013The lone-wolf hacker creating nuisance viruses in a...
View ArticleHelping to Secure the Mobile Campus
InternetCybersecurityAs more students, faculty and staff request to use their personal mobile devices for accessing institutional information and systems, university leaders are faced with the...
View ArticleDocument management strategies to live by—and pitfalls to avoid
Providers share thoughts on what higher ed isn’t paying enough attention to when it comes to electronic documentsAuthor: Pamela Mills-SennUniversity Business, May 2014Despite the benefits of electronic...
View ArticleHow safe are your digital documents?
Electronic document management systems make it easier to comply with digital content regulations, but complacency can threaten effectivenessAuthor: Pamela Mills-SennUniversity Business, May 2014Around...
View ArticlePCI compliance crackdown
Driven by a desire to limit risk, banks put campus credit card data security under the microscopeAuthor: Pamela Mills-SennUniversity Business, February 2015Those involved in securing credit card data...
View ArticleBYOD boundaries on campus
How colleges and universities shape BYOD policies to manage bandwidth, improve security and support learningAuthor: Sherrie NegreaUniversity Business, April 2015Controlling bandwidth is just one reason...
View ArticleEmphasizing campus cybersecurity is crucial
A cybersecurity veteran discusses the importance of higher ed staying in front of security risksAuthor: UB Custom Publishing GroupThe Michigan Cyber Range is a virtual facility where people can...
View ArticleData privacy in the campus cloud
As cloud computing and storage catches on in higher education, data privacy best practices are emergingAuthor: Elizabeth MillardUniversity Business, June 2015The University of Michigan’s very...
View ArticleHard costs of a data breach
Five moves to make immediately following a data breach—and what they’ll cost your collegeAuthor: Sherrie NegreaUniversity Business, June 2015When a school hears from the FBI, the news is not likely to...
View ArticleDetecting and Preventing Cyberattacks in Your Network
Despite being vulnerable to cyberattacks, many colleges and universities still have insufficient threat management defenses.Cyberattackers will evade the strongest perimeter security defenses and spy,...
View ArticleHigher ed's password protectors
The meaning behind eight quotes from IT about your passwordAuthor: Barb FredaUniversity Business, October 2015Picture this: sticky notes on every screen. And if there are none on the monitor, lift up...
View ArticleDetecting and Preventing Cyberattacks in Your Network
New IT security models can protect university systems more effectivelyAuthor: UB Custom Publishing GroupUniversity Business, December 2015Despite being vulnerable to cyberattacks, many colleges and...
View ArticleCampus Computing Project takes pulse of higher ed IT
Higher education migrating slowly to cloud computingAuthor: Tim GoralUniversity Business, December 2015Although it has been a boon to commercial services such as Amazon, IBM, Microsoft and others,...
View ArticleSeeing the passive optical network
Five reasons to actively consider the fiber-based passive optical networkAuthor: Elizabeth MillardUniversity Business, April 2016Unlike wine or cheese, networks don’t tend to improve with age. That’s...
View ArticleColleges need protection beyond antivirus
Products can control who’s using a network, determine what kind of security their devices have, and even fool hackers.Author: Matt ZalaznickUniversity Business, October 2013The intensification of...
View ArticleCyberattacks on the rise in higher education
Foreign governments and organized crime targeting institutions’ most sensitive information. Author: Matt ZalaznickUniversity Business, October 2013The lone-wolf hacker creating nuisance viruses in a...
View ArticleDocument management strategies to live by—and pitfalls to avoid
Providers share thoughts on what higher ed isn’t paying enough attention to when it comes to electronic documentsAuthor: Pamela Mills-SennUniversity Business, May 2014Despite the benefits of electronic...
View ArticleHow safe are your digital documents?
Electronic document management systems make it easier to comply with digital content regulations, but complacency can threaten effectivenessAuthor: Pamela Mills-SennUniversity Business, May 2014Around...
View Article
More Pages to Explore .....