Quantcast
Channel: University Business Magazine - Cybersecurity
Browsing all 36 articles
Browse latest View live

University of Michigan warns against email scams as some direct deposit...

Top NewsAnn Arbor.comUniversity of Michigan is experiencing a newly sophisticated type of cyber attack: An email scam that attempts to get employees' passwords, gain access to their personal...

View Article



Colleges need protection beyond antivirus

Products can control who’s using a network, determine what kind of security their devices have, and even fool hackers.Author: Matt ZalaznickUniversity Business, October 2013The intensification of...

View Article

Cyberattacks on the rise in higher education

Foreign governments and organized crime targeting institutions’ most sensitive information. Author: Matt ZalaznickUniversity Business, October 2013The lone-wolf hacker creating nuisance viruses in a...

View Article

Image may be NSFW.
Clik here to view.

Helping to Secure the Mobile Campus

InternetCybersecurityAs more students, faculty and staff request to use their personal mobile devices for accessing institutional information and systems, university leaders are faced with the...

View Article

Document management strategies to live by—and pitfalls to avoid

Providers share thoughts on what higher ed isn’t paying enough attention to when it comes to electronic documentsAuthor: Pamela Mills-SennUniversity Business, May 2014Despite the benefits of electronic...

View Article


How safe are your digital documents?

Electronic document management systems make it easier to comply with digital content regulations, but complacency can threaten effectivenessAuthor: Pamela Mills-SennUniversity Business, May 2014Around...

View Article

PCI compliance crackdown

Driven by a desire to limit risk, banks put campus credit card data security under the microscopeAuthor: Pamela Mills-SennUniversity Business, February 2015Those involved in securing credit card data...

View Article

BYOD boundaries on campus

How colleges and universities shape BYOD policies to manage bandwidth, improve security and support learningAuthor: Sherrie NegreaUniversity Business, April 2015Controlling bandwidth is just one reason...

View Article


Emphasizing campus cybersecurity is crucial

A cybersecurity veteran discusses the importance of higher ed staying in front of security risksAuthor: UB Custom Publishing GroupThe Michigan Cyber Range is a virtual facility where people can...

View Article


Data privacy in the campus cloud

As cloud computing and storage catches on in higher education, data privacy best practices are emergingAuthor: Elizabeth MillardUniversity Business, June 2015The University of Michigan’s very...

View Article

Hard costs of a data breach

Five moves to make immediately following a data breach—and what they’ll cost your collegeAuthor: Sherrie NegreaUniversity Business, June 2015When a school hears from the FBI, the news is not likely to...

View Article

Image may be NSFW.
Clik here to view.

Detecting and Preventing Cyberattacks in Your Network

Despite being vulnerable to cyberattacks, many colleges and universities still have insufficient threat management defenses.Cyberattackers will evade the strongest perimeter security defenses and spy,...

View Article

Higher ed's password protectors

The meaning behind eight quotes from IT about your passwordAuthor: Barb FredaUniversity Business, October 2015Picture this: sticky notes on every screen. And if there are none on the monitor, lift up...

View Article


Detecting and Preventing Cyberattacks in Your Network

New IT security models can protect university systems more effectivelyAuthor: UB Custom Publishing GroupUniversity Business, December 2015Despite being vulnerable to cyberattacks, many colleges and...

View Article

Campus Computing Project takes pulse of higher ed IT

Higher education migrating slowly to cloud computingAuthor: Tim GoralUniversity Business, December 2015Although it has been a boon to commercial services such as Amazon, IBM, Microsoft and others,...

View Article


Seeing the passive optical network

Five reasons to actively consider the fiber-based passive optical networkAuthor: Elizabeth MillardUniversity Business, April 2016Unlike wine or cheese, networks don’t tend to improve with age. That’s...

View Article

Colleges need protection beyond antivirus

Products can control who’s using a network, determine what kind of security their devices have, and even fool hackers.Author: Matt ZalaznickUniversity Business, October 2013The intensification of...

View Article


Cyberattacks on the rise in higher education

Foreign governments and organized crime targeting institutions’ most sensitive information. Author: Matt ZalaznickUniversity Business, October 2013The lone-wolf hacker creating nuisance viruses in a...

View Article

Document management strategies to live by—and pitfalls to avoid

Providers share thoughts on what higher ed isn’t paying enough attention to when it comes to electronic documentsAuthor: Pamela Mills-SennUniversity Business, May 2014Despite the benefits of electronic...

View Article

How safe are your digital documents?

Electronic document management systems make it easier to comply with digital content regulations, but complacency can threaten effectivenessAuthor: Pamela Mills-SennUniversity Business, May 2014Around...

View Article
Browsing all 36 articles
Browse latest View live




Latest Images