EdTech Magazine - Technology Solutions That Drive Education https://edtechmagazine.com/higher/ en EDUCAUSE https://edtechmagazine.com/higher/events/educause https://edtechmagazine.com/higher/events/educause 3 Ways That AI Can Help Users Avoid Weak Passwords https://edtechmagazine.com/higher/article/2020/10/3-ways-ai-can-help-users-avoid-weak-passwords <p>Rampant password reuse has <a href="https://www.darkreading.com/endpoint/pandemic-credential-stuffing-cybersecuritys-ultimate-inside-job/a/d-id/1338400" target="_blank">caused a spike in credential stuffing</a> during COVID-19. As the pandemic forces colleges and universities to persist with remote learning, <a href="https://www.darkreading.com/threat-intelligence/criminals-selling-videoconferencing-credentials-on-dark-web/d/d-id/1337539" target="_blank">stolen videoconferencing credentials</a> create security risks that can quickly spiral into a web of compromised accounts and applications. So how can cybersecurity pros get their end users to finally stop reusing passwords?</p> <p>One solution, <a href="https://link.springer.com/chapter/10.1007/978-3-030-21568-2_11" target="_blank">some experts say,</a> is artificial intelligence. Here are three ways that AI can help find weak passwords — and deter cybercriminals.</p> <p><a href="https://edtechmagazine.com/higher/article/2020/10/checklist-build-your-defense-depth-strategy" target="_blank" title="Defense-in-Depth strategy checklist"><em><strong>LEARN MORE: </strong>Get the Defense-in-Depth strategy checklist.</em></a></p> Amelia Pang https://edtechmagazine.com/higher/article/2020/10/3-ways-ai-can-help-users-avoid-weak-passwords 4 Key Questions To Help You Protect Remote Learning Data Privacy https://edtechmagazine.com/higher/article/2020/10/4-key-questions-help-you-protect-remote-learning-data-privacy <p>If you’ve ever gotten a parking ticket or had your car towed, you know that there are countless ways to unintentionally break the law. Likewise, the increased use of virtual learning has introduced countless ways for educators to unwittingly violate the <a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank" title="Family Educational Rights and Privacy Act.">Family Educational Rights and Privacy Act.</a></p> <p>More commonly referred to as FERPA, the law was enacted in 1974 to protect the rights and privacy of students, whether in grade school or college. A lot has changed, however, over the past 46 years. Between the internet’s rapid ­evolution and a pandemic that’s forced the bulk of instruction online, there are countless new ways that universities, faculty and staff can violate FERPA. To avoid infringing on students’ privacy rights requires a mindful, intentional approach that takes into account numerous potential questions and risks.</p> <p><a href="https://edtechmagazine.com/higher/article/2020/04/protecting-data-privacy-remote-learning-landscape" target="_blank" title="learn how to protect data privacy in a remote learning landscape"><em><strong>MORE ON EDTECH: </strong>Learn how to protect data privacy in a remote learning landscape.</em></a></p> <h2>1. Is It Actually an Education Record?</h2> <p>While FERPA itself is technology neutral, it is important to note that whatever method or technology is used in an educational setting, it can’t result in an unauthorized disclosure of a student’s education records. But what, exactly, qualifies as a student education record?</p> <p>The answer to that question largely depends on two factors: capture and maintenance. For instance, imagine a professor decides to record a live lecture to repurpose for future asynchronous courses. Over the course of that lecture, various students chime in to ask questions or participate, resulting in their faces, names or other identifying information being recorded. Class ends, the camera is turned off and students leave, but the recording lives on forever, with student identities and a record of their participation available for posterity at the touch of a button — at least until someone presses “delete.”</p> <p>Of course, it’s not just recorded lectures. From temperature scanning to occupancy tracking and contact tracing, universities are considering a wide range of technologies in their efforts to track the coronavirus and prevent transmission. While these technologies will likely play a critical role in protecting student health, universities and their IT teams must remember to consider and apply FERPA guidelines when implementing them. That means being mindful and recognizing that a student education record is being created.</p> Leroy Rooker https://edtechmagazine.com/higher/article/2020/10/4-key-questions-help-you-protect-remote-learning-data-privacy Review: Ensure Advanced Security with VMware Carbon Black Cloud https://edtechmagazine.com/higher/article/2020/10/review-ensure-advanced-security-vmware-carbon-black-cloud <p>Now more than ever, universities need to maintain the highest levels of IT security. According to <a href="https://www.carbonblack.com/resources/global-threat-report-extended-enterprise-under-attack/" target="_blank" title="According to a recent report by Opinion Matters and VMware, 70 percent of respondents said that cyberattack volumes at their organizations have increased in the past 12 months. ">a recent report</a> by Opinion Matters and <a href="https://www.cdwg.com/content/cdwg/en/brand/vmware.html?enkwrd=VMware&amp;key=VMware" target="_blank" title="VMware">VMware</a>, 70 percent of respondents said that cyberattack volumes at their organizations have increased in the past 12 months. This includes 73 percent of respondents who said their departments suffered security breaches within the same period.</p> <p>These challenges underscore the need for universities to strengthen their security operations centers. <a href="https://cdw-prod.adobecqms.net/content/dam/cdw/on-domain-cdw/brands/vmware/vmware-carbon-black-cloud-enterprise-edr-data-sheet.pdf" target="_blank" title="VMware Carbon Black Cloud Enterprise EDR">VMware Carbon Black Enterprise EDR</a> provides advanced threat hunting and incident response capabilities for vital visibility to universities’ top IT security personnel.</p> Carlos Soto https://edtechmagazine.com/higher/article/2020/10/review-ensure-advanced-security-vmware-carbon-black-cloud Remote Learning and the Rapid Shift in Cloud Adoption https://edtechmagazine.com/higher/article/2020/10/remote-learning-and-rapid-shift-cloud-adoption <p>Cloud advocates have long touted agility and flexibility as the technology’s standout strengths. Few situations have tested those claims like the COVID-19 pandemic.</p> <p>Now, as universities and their stakeholders continue to conduct everything from instruction to operations online, colleges are embracing solutions that allow them to offer — and pivot among — a variety of course delivery and operational modes. As a result, the pandemic has accelerated cloud adoption in a field that wasn’t always quick to embrace it.</p> <p>Just a few years ago, one headline proclaimed, “<a href="https://evolllution.com/revenue-streams/market_opportunities/higher-education-wont-be-able-to-resist-the-cloud-much-longer/" target="_blank" title="Higher Education Won’t Be Able To Resist The Cloud Much Longer">Higher Education Won’t Be Able to Resist the Cloud Much Longer</a>.” Since then, of course, many institutions have migrated at least some operations to the cloud, but the overall trajectory wasn’t exactly fast-tracked.</p> <p>“I think the pandemic has done in a period of weeks and months what would have taken years and decades in terms of adoption,” says Damian Doyle, associate vice president for enterprise infrastructure solutions at the <a href="https://www.umbc.edu/" target="_blank" title="University of Maryland Baltimore County">University of Maryland, Baltimore County</a>.</p> Amy Burroughs https://edtechmagazine.com/higher/article/2020/10/remote-learning-and-rapid-shift-cloud-adoption 4 Tips For Protecting Intellectual Property In Academia https://edtechmagazine.com/higher/article/2020/10/4-tips-protecting-intellectual-property-academia <p>Around the world, academic researchers have turned their focus to combating the novel coronavirus. From medical schools to biology labs, researchers are working nonstop to better understand the virus, develop therapeutic treatments and create a vaccine that could lift the pandemic’s shadow.</p> <p>Collaboration across higher education is bringing the world’s best minds to bear on COVID-19. The resulting<br /> intellectual property could have tremendous public health benefits. But it also has massive potential commercial value, and few things are more attractive to would-be cybercriminals than other people’s valuable ideas.</p> <p>Companies and countries around the world are racing to develop safe, effective and potentially profitable treatments and vaccines. <a href="https://thehill.com/policy/cybersecurity/518051-fbi-director-warns-that-chinese-hackers-are-still-targeting-us-covid-19" target="_blank" title="FBI director warns that Chinese hackers are still targeting US COVID-19 research">Recent reports from intelligence agencies</a> and prosecutors in the United States and the United Kingdom accuse the Russian and Chinese governments of engaging in hacking efforts to steal coronavirus research. Universities find themselves in the crosshairs, suddenly the targets of sophisticated intelligence-gathering operations.</p> <p>Let’s consider some ways research institutions can protect their intellectual property from cybercrime.</p> Mike Chapple https://edtechmagazine.com/higher/article/2020/10/4-tips-protecting-intellectual-property-academia The Great Pivot: John O’Brien On the Shifting Roles of Higher Ed IT https://edtechmagazine.com/higher/article/2020/10/great-pivot-john-obrien-shifting-roles-higher-ed-it <p>The world of higher education launched into a tailspin in March when COVID-19 drove universities around the nation to push instruction online. After years of seeking a strategic place at the table, IT professionals in higher education found themselves with an opportunity to prove exactly how critical their roles have become to student and faculty success.</p> <p>To gauge how the pandemic and the shift to virtual instruction have affected higher ed IT teams, <em>EdTech</em> spoke with John O’Brien, CEO of <a href="https://www.educause.edu/" target="_blank" title="EDUCAUSE">EDUCAUSE</a>. With more than 100,000 members in approximately 50 countries, EDUCAUSE is the largest community of higher education IT experts. The organization has played a guiding role in helping colleges and universities around the country adjust to this year’s rapid shift to remote, online and blended learning. </p> <p><a href="https://edtechmagazine.com/higher/article/2020/09/covid-19-brings-cybersecurity-risks-and-opportunities" tabindex="-1" target="_blank" title="EDUCAUSE Brian Kelly"><em><strong>MORE ON EDTECH: </strong>Read our exclusive Q&amp;A with EDUCAUSE Cybersecurity Program Director Brian Kelly.</em></a></p> Lauren Glenn Manfuso https://edtechmagazine.com/higher/article/2020/10/great-pivot-john-obrien-shifting-roles-higher-ed-it Review: The New Lenovo ThinkPad X1 Carbon Engages Remote Learners https://edtechmagazine.com/higher/article/2020/10/review-new-lenovo-thinkpad-x1-carbon-engages-remote-learners <p>With remote, online and blended learning continuing across higher education, many universities are providing loaner laptops to students who cannot purchase their own devices. But finding the right notebook computer to equip masses of college students and faculty members isn’t easy.</p> <p>Higher education coursework often requires a speedy processor, lots of RAM and large screens. The new <a href="https://www.cdwg.com/search/?key=Lenovo+ThinkPad+X1+Carbon" target="_blank" title="Lenovo ThinkPad X1 Carbon">Lenovo ThinkPad X1 Carbon</a>, however, provides mobility, power and features that rarely accompany such a portable design.</p> John Breeden II https://edtechmagazine.com/higher/article/2020/10/review-new-lenovo-thinkpad-x1-carbon-engages-remote-learners Insights Report: IT Investment Priorities and Realities https://edtechmagazine.com/higher/resources/white-paper/insights-report-it-investment-priorities-and-realities <p>The educational technology landscape is rapidly evolving. Over the past few years, school districts have witnessed changes ranging from an influx in emerging technologies such as virtual reality to a greater emphasis on data security amid increasing cyberthreats. But many schools still struggle to adapt. Some continue to rely on systems that make it difficult to seamlessly integrate new tools for learning, while others lack proper cybersecurity training for their staff.</p> <p>School districts can’t afford to lag behind, especially with the coronavirus pandemic spotlighting gaps in technology access, adoption and security during remote learning. Yet budget remains a top concern for educational leaders across the country. Navigating public education funding, especially during an economic slowdown, is a challenge for those looking to implement new technology initiatives or upgrade existing infrastructure.</p> <p>To make smarter decisions about technology spending and to be ready for unpredictable scenarios that may disrupt operations, education and IT leaders must always think ahead.</p> <p>This IDG survey, conducted in partnership with CDW, offers key findings to help technical and nontechnical leaders across industries plan for future spending. Insights include:</p> <ul><li>Why addressing the human side of cybersecurity is crucial to mitigating insider threats</li> <li>How deployment and integration strategies for new tools impact workplace productivity</li> <li>Cloud computing’s role as a digital transformation catalyst</li> <li>How embracing a data-driven culture can enhance and transform student learning</li> </ul><p><strong>Learn more by downloading the full report: “IT Investment Priorities and Realities.”</strong></p> https://edtechmagazine.com/higher/resources/white-paper/insights-report-it-investment-priorities-and-realities The Checklist: Build Your Defense-in-Depth Strategy https://edtechmagazine.com/higher/article/2020/10/checklist-build-your-defense-depth-strategy <p>Shortly after COVID-19 forced postsecondary institutions to close campuses and move instruction online, an uptick in cyberattacks was seen across higher education. Universities large and small found themselves subject to ransomware, hacked videoconference classes and data leakage.</p> <p>Meanwhile, with the vast majority of their users connecting from home, higher ed IT teams find themselves trying to secure a more complex network landscape than ever before. Enter defense in depth.</p> <p>“Traditional, ‘monolithic,’ approaches to cybersecurity are becoming less reliable,” Richard Rudnicki, a Deloitte security specialist with 15 years of experience delivering cyber risk and regulatory compliance solutions to higher education, tells <a href="https://edtechmagazine.com/higher/article/2020/10/defense-depth-did-strategies-protect-higher-ed-users-against-cyberthreats-perfcon" title=" Richard Rudnicki, a Deloitte security specialist with 15 years of experience "><em>EdTech</em></a>. “To address evolving risks, institutions should adopt multilayered approaches that involve people, process and technology.”</p> Lauren Glenn Manfuso https://edtechmagazine.com/higher/article/2020/10/checklist-build-your-defense-depth-strategy