EdTech Magazine - Technology Solutions That Drive Education https://edtechmagazine.com/higher/rss.xml en 4 Tips for a Successful Upgrade to Digital Security Cameras https://edtechmagazine.com/higher/article/2019/03/4-tips-successful-upgrade-digital-security-cameras <span>4 Tips for a Successful Upgrade to Digital Security Cameras</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 03/20/2019 - 17:00</span> <div><p>Keeping students, faculty and staff physically safe is the highest priority in higher education. Given the open nature of most campuses, a <a href="https://edtechmagazine.com/higher/article/2018/06/ubtech-2018-new-threats-and-tools-reshape-data-security-landscape">solid security camera environment </a><strong>extends the blanket of protection</strong> by letting staff hit the rewind button to take a close look at reported events. </p> <p>No institution wants to be powerless to identify a suspect because of grainy camera images or to report a security breach due to a lack of data encryption. Today, better quality in both areas is intrinsic to digital camera offerings. </p> <p>“It simply <strong>makes sense to go digital today</strong>,” says Scott Zemke, strategic business architect for IT services and the <a href="https://www.uark.edu/" target="_blank">University of Arkansas</a> Police Department. “The quality of what you get picturewise can literally save a life — and has.”</p> <p>Guide your analog-to-digital transition with these four tips.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/02/partnerships-between-it-and-physical-security-improve-campus-safety" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Check out how universities are using both IT and physical security to improve campus safety.</em></a></p> <h2 id="toc_0">1. Integrate Cameras into Campus Identity Management Systems</h2> <p>Find your best-fit solution and plan to stick with it for a while. Why just one?<br /> “The video management software that you choose should fully integrate with your campus <a href="https://edtechmagazine.com/higher/article/2019/03/adopting-zero-trust-network-can-improve-cybersecurity-posture-across-higher-ed">identity management system</a>,” says Zemke. “Having <strong>multiple types of software </strong>dramatically increases the complexity of security system management, and time is of the essence when security events arise.” </p> <h2 id="toc_1">2. For the Best Digital Camera Placement, Consult Safety Officers</h2> <p>Use the upgrade as an opportunity for improvement. Often, campus departments place security cameras based on assumptions, says Zemke. A better strategy is to involve campus police to <strong>ensure locations are optimal from a law enforcement perspective</strong>. “There’s a science behind placement,” he says. </p> <h2 id="toc_2">3. Review Access and Management of Security Video Assets</h2> <p>In legacy systems, the <strong>management of and access to video are often loos</strong>e. But with access come risk and responsibility, and users need to know that. Now’s the time to identify who needs access, to what and why — and to emphasize to users that with access come risk and responsibility. </p> <p>At the U of A, only the police department has access. “The access conversation is tough,” says Zemke. “Having role-based integration with Active Directory makes it easier.” </p> <h2 id="toc_3">4. Plan Ahead for an Increase in Requests for Security Footage</h2> <p>The U of A has gone from <strong>700 </strong>security cameras to approximately <strong>2,500</strong>. Leaders anticipate moving toward <strong>100 percent</strong> digital adoption as analog systems die. Obtaining high-quality images and centralizing management are simply easier with digital systems. As cameras positively affect campus safety, you can expect an uptick in requests — often delivered with a sense of urgency — so be ready with resources.</p> <p><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11741"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Paige%20Francis.jpg?itok=DmrRsBWj" width="58" height="58" alt="Paige Francis" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11741"> <div>Paige Francis</div> </a> </div> <div class="author-bio"> <p> <div><p>Paige Francis is the associate CIO for the University of Arkansas.</p> </div> </p> </div> </div> </div> </div> Wed, 20 Mar 2019 21:00:45 +0000 eli.zimmerman_9856 41976 at https://edtechmagazine.com/higher Smart Dust Could Ramp Up Internet of Things in Higher Education https://edtechmagazine.com/higher/article/2019/03/smart-dust-could-ramp-internet-things-higher-education <span>Smart Dust Could Ramp Up Internet of Things in Higher Education</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 03/20/2019 - 12:09</span> <div><p>When Kristofer Pister coined the phrase “smart dust” in 1997, he did so with his tongue planted firmly in his cheek. </p> <p>“I was at UCLA, and <strong>everything in LA at that time was smart</strong>: smart houses, smart freeways. The world was smart,” says Pister, who is now a professor of electrical engineering and computer sciences at the University of California, Berkeley and co-director of the <a href="https://swarmlab.berkeley.edu/home" target="_blank">Berkeley Sensor &amp; Actuator Center and the Ubiquitous Swarm Lab</a>. </p> <p>So why not name his wireless sensor nodes after something tiny — and call them smart — too? </p> <p>“The idea that <strong>computation and communication and sensors are getting smaller and smaller and smaller</strong> and will disappear from view — that is very real,” he says.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/07/universities-partner-cities-boost-budgets-technology-projects" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how universities are working with cities to boost the budget for technology projects.</em></a></p> <h2 id="toc_0">Smart Dust Harvests Energy from Surprising Sources</h2> <p>More than 20 years later, Gartner named smart dust an emerging trend in its “<a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-20-gartner-identifies-five-emerging-technology-trends-that-will-blur-the-lines-between-human-and-machine" target="_blank">Hype Cycle for Emerging Technologies, 2018</a>” report. The technology has made leaps and bounds in its ability to expend small amounts of energy for tasks that once required a wired connection or bulky batteries. And the nodes are, as promised, small.</p> <p>A version created at the <a href="https://umich.edu/" target="_blank">University of Michigan</a> — the Michigan Micro Mote, <strong>once considered the world’s smallest computer</strong> — is so tiny, researchers say, that <a href="https://www.eecs.umich.edu/eecs/about/articles/2015/Worlds-Smallest-Computer-Michigan-Micro-Mote.html" target="_blank">150 can fit inside a single thimble</a>. </p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/higher/higher/taxonomy/term/11731"><img src="/higher/higher/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/jen-a-miller-portrait.jpg?itok=57nmpxLC" width="58" height="58" alt="Jen Miller" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/higher/higher/taxonomy/term/11731"> <div> Jen A. Miller</div> </a> </div> <div class="author-bio"> <p> <div><p>Jen A. Miller is the author of Running: A Love Story. Her work has appeared in The New York Times, Washington Post, CIO Dive, Supply Chain Dive. and Runner's World. She lives in N.J. with her dog Annie Oakley.<p></p></p> </div> </p> </div> </div> </div> </div> Wed, 20 Mar 2019 16:09:50 +0000 eli.zimmerman_9856 41971 at https://edtechmagazine.com/higher To Reap Cloud Benefits, Address and Overcome Potential Objections https://edtechmagazine.com/higher/article/2019/03/reap-cloud-benefits-address-and-overcome-potential-objections <span>To Reap Cloud Benefits, Address and Overcome Potential Objections</span> <span><span lang="" about="/higher/higher/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Tue, 03/19/2019 - 13:18</span> <div><p>Cloud solutions <a href="https://edtechmagazine.com/higher/article/2018/09/it-leaders-tout-savings-and-security-cloud-storage">continue to be integral to higher education</a> IT, yet misconceptions persist among those who aren’t familiar with them. The <a href="https://edtechmagazine.com/higher/article/2018/09/pain-points-and-solutions-cloud-security-it-teams-perfcon">cloud is too complex</a>, for example, or staff <strong>won’t have the necessary skills to manage the new environment</strong>.</p> <p>Debunking these concerns is important, because if IT departments aren’t able to get past them — or if they can’t help senior leaders get past them — their institutions may not be able to reap the many benefits of cloud computing. </p> <p>A good first step is to <strong>understand those potential objections</strong> and recognize that, in the vast majority of cases, they can be resolved.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/02/how-use-hybrid-clouds-manage-demand-peaks" target="_blank"><em><strong>MORE FROM EDTECH:</strong> See how universities use hybrid cloud to manage demand peaks.</em></a></p> <h2 id="toc_0">Identify Workloads That Are the Best Fit for Cloud</h2> <p>The very promise of the cloud can be, for some, a barrier to success. So much hype surrounds this technology that it can be <strong>challenging to cut through the rhetoric</strong> and understand how moving workloads to the cloud can support business objectives for a particular institution.</p> <p>There are lots of reasons why a move to the cloud can deliver agility, scalability, cost savings and ease of management. But IT leaders must determine how those benefits translate to specific institutions, each with its own unique set of requirements, quirks and concerns.</p> <p>IT leaders have not only a range of vendors to choose from, but also distinct types of environments (<strong>private, public and hybrid</strong>). Then, they must assess the data and systems that could potentially be moved to the cloud and determine which ones make the most sense to move. And all of that must happen before they even begin to tackle the i<a href="https://edtechmagazine.com/higher/article/2018/09/how-colleges-can-overcome-top-cloud-migration-challenges">ntricacies of migration</a>, staff training and data security.</p> <p>“The cloud is <strong>far more complicated than most realize</strong>,” Shane Zide, principal for cloud client services for CDW, writes in “<a href="https://www.cdw.com/content/cdw/en/orchestration/hybrid-cloud-infrastructure-report.html" target="_blank">The Modern IT Infrastructure Insight Report</a>.” “Deciding which workloads to move can be daunting, but getting it right makes a huge impact.”</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-trends.html"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/healthtechmagazine.net/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2 id="toc_1">Understand the Institutional Reasons to Move to Cloud</h2> <p>That complexity is one reason why many institutions seek help from trusted vendor partners, who can provide insight into options and best practices. Another smart move, for those who elect to go it alone, is <strong>to unify cloud storage under a single strategy</strong>, <a href="https://edtechmagazine.com/higher/article/2018/08/key-considerations-your-next-high-ed-cloud-storage-solution">advises Nick Young</a>, IT manager for cloud collaboration and productivity services at the <a href="https://www.uncg.edu/" target="_blank">University of North Carolina, Greensboro</a>.</p> <p>“Thinking through pertinent questions and issues before you deploy a solution can help to <strong>make your solution a success for all stakeholders</strong>: campus users, IT staff and the institution,” he writes.</p> <p>The potential variables of cloud environments are part of what make them beneficial, so it’s worth the effort to fully understand the range of possibilities. The <a href="https://www.unt.edu" target="_blank">University of North Texas</a> adopted<a href="https://edtechmagazine.com/higher/article/2019/02/how-use-hybrid-clouds-manage-demand-peaks"> a hybrid cloud model</a>, in part to <strong>reduce the costs associated with having several teams</strong> manage separate systems on campus.</p> <p>Yet a cost model revealed some systems were not ready for the cloud and would actually be more costly there. Like other adoptees of hybrid solutions, UNT developed a custom strategy, running Salesforce, Canvas and similar applications in the cloud and keeping <strong>data analytics, enterprise resource planning </strong><strong>and</strong><strong> other applications</strong> in-house.</p> <p>Other institutions intensify their move to the cloud to accomplish a specific objective. Cloud was always part of the picture at the <a href="https://relay.edu/" target="_blank">Relay Graduate School of Education</a>, but fast growth and a desire to solidify its disaster recovery and business continuity strategy called for the cloud to play a bigger role.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/02/relay-graduate-school-supports-growth-hybrid-cloud" target="_blank"><em><strong>MORE FROM EDTECH:</strong> Relay Graduate School of Education supports growth with hybrid cloud.</em></a></p> <h2 id="toc_2">Don’t Overlook the Need to Prepare Staff for a New Skill Set</h2> <p>Relay’s experience also highlights another potential obstacle to cloud adoption: the <strong>effort that may be necessary to help staff make the transition</strong>. Relay’s senior director of technology products and support, Joaquin Alvarez, says the process isn’t as simple as flipping a switch. But it’s manageable, he says. Relay’s strategy was to recognize that there would be a transition period to work through and to minimize bumps through staff preparation and communication.</p> <p>The potential for a skills gap is real, and it’s one that shouldn’t be taken lightly. Institutions unable to align staff competencies with required skills, particularly in a department as critical as IT, may find themselves <a href="https://www.business.com/articles/bridge-cloud-skills-gap/" target="_blank">unable to achieve</a> their objectives efficiently, innovation and digital transformation. In addition to developing a plan to address existing skills gaps, <strong>IT leaders should also be forward-looking</strong>. Many institutions find that, over time, their cloud adoption expands, and managers would be wise to anticipate the need for cloud experts may increase as well.</p> <p>The beauty of the hype about cloud computing is that, in the end, it isn’t just hype. Crafting the right solution for your institution may take time, but the rewards are well worth it.</p> <p><em>This article is part of EdTech: Focus on Higher Education’s UniversITy blog series.</em></p> <p><a href="http://www.edtechmagazine.com/higher/university" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/higher/sites/default/files/university-400.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/david-hutchins"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/author/smartit_hutchins.jpg?itok=sL4EjfTl" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/david-hutchins"> <div>David Hutchins</div> </a> </div> <div class="author-bio"> <p> <div><p>David Hutchins is vice president of higher education and K–12 education for CDW•G, a leading technology provider to government and education.</p> </div> </p> </div> </div> </div> </div> Tue, 19 Mar 2019 17:18:50 +0000 eli.zimmerman_9856 41966 at https://edtechmagazine.com/higher Universities Use New Esports Programs to Entice Students https://edtechmagazine.com/higher/article/2019/03/universities-use-new-esports-programs-entice-students <span>Universities Use New Esports Programs to Entice Students</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Mon, 03/18/2019 - 11:11</span> <div><p>Universities have jumped on board with competitive gaming and seen several benefits, including growing recruitment and student satisfaction. </p> <p>Many institutions that have not joined the esports movement are seeing the gains of supporting such programs, leading to an <strong>expected surge in competitive gaming</strong> over the next few years.</p> <p>As of 2018, <a href="http://www.espn.com/esports/story/_/id/21152905/college-esports-list-varsity-esports-programs-north-america" target="_blank">125 colleges and universities</a> had developed a varsity esports program — a significant growth from the <a href="http://www.rmueagles.com/article/907" target="_blank">single pioneer in 2014</a> — and more are launching started all the time. </p> <p>The world of esports is new territory for many universities, and for those unsure of where and how to start, it may be helpful to <strong>look at existing programs that already found some measure of success.</strong></p> <p><a href="https://edtechmagazine.com/higher/article/2018/11/universities-invest-esports-academic-opportunities" target="_blank"><em><strong>MORE FROM EDTECH:</strong> Universities invest in esports academic programs.</em></a></p> <h2 id="toc_0">University of California Invests in Esports Arena</h2> <p>In 2016, administrators at the University of California, Irvine recognized the potential impact esports could have on campus life and became <a href="https://news.uci.edu/2016/03/30/uci-to-launch-first-of-its-kind-official-e-sports-initiative-in-the-fall/" target="_blank">the first public research university </a>to invest in an esports program.</p> <p>The university created a <a href="https://www.cdw.com/content/cdw/en/products/esports.html" target="_blank">state-of-the-art esports gaming facility</a>, which now stands at the heart of campus.</p> <p>Students walking into the <strong>3,500-square-foot space</strong> are greeted by the whirring of 72 <a href="https://www.cdw.com/product/ibuypower-042iv2-i7-9700k-1-16-w10h/5390650" target="_blank">iBUYPOWER</a> gaming computers. Each of these gaming machines is paired with <a href="https://www.cdwg.com/content/cdwg/en/brand/logitech.html?enkwrd=logitech" target="_blank">Logitech</a> gear and high-quality gaming chairs to improve the student experience.</p> <p>Through investments in top-of-the-line equipment and talent recruitment, <strong>UCI became a top-tier esports institution</strong>, winning the <a href="http://www.espn.com/esports/story/_/id/23756483/uc-irvine-beats-columbia-college-3-0-college-league-legends-championship" target="_blank">first collegiate esports national tournament</a> in 2018.</p> <p>UCI’s commitment to esports does not stop at competitive play. The university is now host to a number of <a href="https://esports.uci.edu/2018/07/05/uci-esports-continues-supporting-high-school-esports-with-nasef/" target="_blank">esports high school partnerships</a>, including a summer program specifically for girls at <a href="https://esports.uci.edu/2018/07/24/uci-esports-and-nasef-host-the-2018-girls-in-gaming-summer-camp/" target="_blank">its gaming facility</a>.</p> <p>By utilizing its esports program this way, UCI created <strong>another pipeline for student recruitment</strong>.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/10/esports-next-frontier-higher-ed-infographic" target="_blank"><img alt="HiEd-eSports-Infographic_VisualCTA.jpg" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/higher/sites/edtechmagazine.com.higher/files/HiEd-eSports-Infographic_VisualCTA.jpg" /></a></p> <h2 id="toc_1">Smaller Institutions Boost Interest and Engagement with Esports</h2> <p>Colleges find including esports in campus programs can greatly benefit their student recruitment and retention rates, even if they lack the funds of larger universities. </p> <p>When Randy Sieminski, director of athletics at the <a href="http://www.canton.edu/" target="_blank">State of New York University at Canton</a>, started the university’s esports program, prospective and <strong>on-campus students showed a surge of interest</strong>.</p> <p>“Since launching the esports program in December 2017, we’ve seen tremendous uptake,” Sieminski wrote for <a href="https://www.ecampusnews.com/2018/08/10/the-explosive-growth-of-collegiate-esports-part-1/2/" target="_blank"><em>eCampus News</em></a>. “We’ve been able to reach new groups of enrolled students who weren’t previously engaged in campus life and recruit prospective esports students looking for an opportunity to compete.”</p> <p>The college now has two academic esports majors and <a href="http://news.canton.edu/blog/2018/08/24/esports-arena/" target="_blank">a dedicated arena</a>, which includes powerful <a href="https://www.cdw.com/search/computers/?key=alienware&amp;searchscope=all&amp;sr=1&amp;w=c&amp;maxrecords=72" target="_blank">Alienware</a> computers and <a href="https://www.cdwg.com/content/cdwg/en/brand/extreme-networks.html" target="_blank">Extreme Network’s Smart OmniEdge</a> network to support over <strong>30 students who compete regularly</strong>.</p> <p>At <a href="https://www.snhu.edu/" target="_blank">Southern New Hampshire University,</a> administrators experienced an impressive uptick in campus engagement after establishing an esports team.</p> <p>“We had an incredibly large turnout. There were <strong>110 students for tryouts, and another 100 signed up to be involved</strong>, as commentary, or just watching and being a fan,” <a href="https://www.concordmonitor.com/esports-college-New-England-College-SNHU-nh-21037981" target="_blank">said</a> Timothy Fowler, SNHU’s first esports director. “I’m working on recruiting next year, for incoming students who might not have thought of coming to SNHU until they saw we had an esports program and they could try out for it.”</p> <p>The esports movement in higher education is still young, and <a href="https://edtechmagazine.com/higher/article/2018/11/why-esports-should-be-your-it-teams-radar">interest is only expected to grow</a>. Universities that have not joined the world of competitive gaming will want to begin planning now to stay ahead of the trend.</p> <p><em>This article is part of EdTech: Focus on Higher Education’s UniversITy blog series.</em></p> <p><a href="http://www.edtechmagazine.com/higher/university" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/higher/sites/default/files/university-400.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/joe-mcallister"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/JoeMcAllister.jpg?itok=wnB4yNmz" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/joe-mcallister"> <div>Joe McAllister</div> </a> </div> <div class="author-bio"> <p> <div><p>Joe McAllister is a learning environment advisor at CDW•G.</p> </div> </p> </div> </div> </div> </div> Mon, 18 Mar 2019 15:11:55 +0000 eli.zimmerman_9856 41961 at https://edtechmagazine.com/higher Cyber Espionage Puts Research Universities at Risk https://edtechmagazine.com/higher/article/2019/03/cyber-espionage-puts-research-universities-risk <span>Cyber Espionage Puts Research Universities at Risk</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Fri, 03/15/2019 - 13:10</span> <div><p>Universities face cyber espionage threats as the future of military superiority becomes increasingly entwined with technological innovation.</p> <p>APT40, a China-nexus cyber espionage group, is working to<strong> infiltrate research institutions in higher education</strong> as part of China's larger information acquisition strategy, <em>The</em> <em>Wall Street Journal</em> <a href="https://www.wsj.com/articles/chinese-hackers-target-universities-in-pursuit-of-maritime-military-secrets-11551781800?mod=hp_lead_pos1" target="_blank">reports</a>.</p> <p>APT40 has targeted several universities already, including <a href="https://www.psu.edu/" target="_blank">Pennsylvania State University</a> and <a href="https://www.duke.edu/" target="_blank">Duke University</a>, according to the article. </p> <p>Experts at my company, cybersecurity provider <a href="https://www.cdwg.com/content/cdwg/en/brand/fireeye.html?enkwrd=FireEye" target="_blank">FireEye</a>, identified <a href="https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html" target="_blank">a further wave of espionage activity</a> from APT40 in 2018, which <strong>hit multiple organizations, including an academic institution</strong>. All of these were conducting work on maritime defense–related projects. </p> <p>This was all one arm of a much larger campaign of intrusions that <a href="https://www.wsj.com/articles/u-s-navy-is-struggling-to-fend-off-chinese-hackers-officials-say-11544783401" target="_blank">impacted the U.S. Navy and defense contractors</a> and prompted the Navy to conduct a review into their systems.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/03/evaluating-intrusion-prevention-systems-higher-education-perfcon" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Check out why universities should evaluate their intrusion prevention systems.</em></a></p> <h2 id="toc_0">Cyber Espionage from Abroad Is Familiar Territory for Universities</h2> <p>Foreign intelligence threats to universities are not new. Several <a href="https://www.aspi.org.au/report/picking-flowers-making-honey" target="_blank">reports</a> last year illustrated how traditional influence and intelligence campaigns — <a href="https://www.voanews.com/a/us-officials-warn-of-chinese-influence-in-american-higher-education/4600204.html" target="_blank">predominantly from China</a> — focused on Western universities and their students, faculty and administrators to <strong>collect data, leverage influence and track expats studying abroad</strong>. </p> <p>In contrast with recruiting students and professors to be intelligence assets, cyber espionage, in many cases, is a less costly way to steal information. </p> <p>Cyber espionage groups will <strong>often gravitate to the weakest link to collect data</strong>. Considering the important work done by academic researchers for both commercial and military applications, poorly secured university networks have become a target of choice for adversaries.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11711"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Luke%20McNamara.jpeg.jpg?itok=ENq_uAGo" width="58" height="58" alt="Luke McNamara" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11711"> <div>Luke McNamara</div> </a> </div> <div class="author-bio"> <p> <div><p>Luke McNamara is a Principal Analyst at cybersecurity company FireEye.</p> </div> </p> </div> </div> </div> </div> Fri, 15 Mar 2019 17:10:13 +0000 eli.zimmerman_9856 41956 at https://edtechmagazine.com/higher York College of Pennsylvania Builds Up IT Staff at All Levels https://edtechmagazine.com/higher/article/2019/03/york-college-pennsylvania-builds-it-staff-all-levels <span>York College of Pennsylvania Builds Up IT Staff at All Levels</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Thu, 03/14/2019 - 10:33</span> <div><p>As campus technologies evolve, so do the skill sets required to effectively lead, manage and implement strategic goals. </p> <p>That’s why <strong>ongoing leadership development is a vital component</strong> to the success of IT departments in higher education. Even as lean staffing and limited budgets stretch institutions thin, a flourishing leadership program can — and should — happen.</p> <p>Organizations may overlook the importance of investing in employee leadership skills, but it’s an effective way to motivate staff to take initiative regardless of their position. </p> <p>Because of this and other benefits, <a href="https://www.ycp.edu/" target="_blank">York College of Pennsylvania</a> CIO Ilya Yakovlev saw an opportunity in early 2017 to establish a leadership program for the newly formed Library and Technology Services department. The committee that he convened succeeded in building <strong>a program that is cost-effective, inclusive and consistent</strong>.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/02/chief-innovation-officers-join-campus-c-suite" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Check out how chief innovation officers are effecting change on campus.</em></a></p> <h2 id="toc_0">College Gets Creative to Deliver Low-Cost Leadership Training</h2> <p>At the outset, our leadership development committee balanced <strong>needs versus costs to maximize professional development</strong> while staying within budget. For starters, the committee partnered with a third-party consulting firm to devise streamlined and customized training. </p> <p>The resulting high-intensity course was presented to nearly half of the LTS staff, with the goal of developing targeted skill sets.</p> <p>We achieved cost savings by <strong>reducing the duration of the course and the number of participants</strong>, yet we ensured that this formalized leadership training was provided to those who would benefit most. This initial coursework built the pillars on which upcoming sessions rested.</p> <p>Subsequent sessions were open to everyone in LTS, and demand skyrocketed. We continued to keep costs low by <strong>tapping internal resources and outreach to other campus departments</strong>. </p> <p>In one session, for example, attendees participated in individual skills assessments in partnership with the YCP Leadership Development Center. In another instance, we invited model leaders from across campus to <strong>present their leadership journeys</strong>. These budget-taming steps not only helped get the program off the ground, but also provided quality training.</p> <h2 id="toc_1">Peer Coaching Builds Accountability for IT Staff</h2> <p>As YCP invested its <strong>time, money and effort to develop staff members into leaders</strong>, the challenge became how to maintain momentum by keeping everyone focused on refining their leadership skills. </p> <p>The leadership program had blossomed in the LTS department, in part, because of Yakolev, the program’s champion. Members of the senior administrative staff further validated those efforts, with some <strong>serving as panel members and trainers for a leadership journey series</strong>. </p> <p>We offered sessions on a regular basis each semester, and the consistent engagement proved that staff members valued the program and took it seriously.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11691"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Robert%20Yoka%20-%20Headshot.jpg?itok=Ce57IEbl" width="58" height="58" alt="Robert Yoka" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11691"> <div>Robert J. Yoka</div> </a> </div> <div class="author-bio"> <p> <div><p>Robert J. Yoka is the director of infrastructure and security services at York College in Pennsylvania.</p> </div> </p> </div> </div> </div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11696"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Ana%20Gipe%20-%20Headshot.jpg?itok=_vMlMkRV" width="58" height="58" alt="Ana Gipe Headshot" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11696"> <div>Ana Gipe</div> </a> </div> <div class="author-bio"> <p> <div><p>Ana Gipe is the systems engineer at York College in Pennsylvania.</p> </div> </p> </div> </div> </div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11701"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Chris%20Anderson%20-%20Headshot.jpg?itok=u8evkZZV" width="58" height="58" alt="Chris Anderson" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11701"> <div>Christopher Anderson</div> </a> </div> <div class="author-bio"> <p> <div><p>Christopher Anderson is the desktop support manager for York College in Pennsylvania.</p> </div> </p> </div> </div> </div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11706"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Karen%20Bumbaugh%20-%20Headshot.jpg?itok=DVvVNZEw" width="58" height="58" alt="Karen Bumbaugh" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11706"> <div>Karen Bumbaugh</div> </a> </div> <div class="author-bio"> <p> <div><p>Karen Bumbaugh is the assistant director of client services at York College in Pennsylvania.</p> </div> </p> </div> </div> </div> </div> Thu, 14 Mar 2019 14:33:57 +0000 eli.zimmerman_9856 41951 at https://edtechmagazine.com/higher Lifelong Learning Credentials Require Both Technology and a Trust Framework https://edtechmagazine.com/higher/article/2019/03/lifelong-learning-credentials-require-both-technology-and-trust-framework <span>Lifelong Learning Credentials Require Both Technology and a Trust Framework</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 03/13/2019 - 11:37</span> <div><p>There has been much discussion recently about the<a href="https://edtechmagazine.com/higher/article/2019/02/higher-education-revamps-online-education-2019-traditional-enrollment-declines"> value of credentials in helping students</a> demonstrate the skills required for career success and the need to <strong>transform how students collect and share these credentials</strong>. </p> <p>These valuable discussions point to exciting changes in the role of higher education, in which students may have access to a <strong>portfolio of skills demonstrations</strong> throughout their lifelong learning journey. </p> <p>Unfortunately, from a technological perspective, conversations about how to realize this vision often devolve into something much less exciting: requirements around <strong>establishing identity, formatting data, and designing interfaces</strong> to ensure consistency and interoperability across all transactions, often through the use of standards and standardization. </p> <p>Similarly, as with many conversations around how technology will support innovation in education, this topic sometimes centers on a particular solution, such as <a href="https://edtechmagazine.com/higher/article/2018/08/universities-use-blockchain-streamline-student-services">blockchain</a>. </p> <p>The downside of this devolution is that it obfuscates a critical question: How might technology support a new vision of <strong>lifelong learning and skills attainment</strong>? </p> <p>We need to answer this question in a way that helps us understand the critical components of the relationship between this vision and technology, to see the areas in which technology can genuinely provide value and where it might fall short.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/03/4-things-experts-want-you-know-about-blockchain-higher-ed" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Read four things experts want higher education professionals to know about blockchain.</em></a></p> <h2 id="toc_0">Driver’s License Model Reflects the Role of Trust and Authenticity</h2> <p>We already have a model we can use to understand how this might work: <strong>driver’s licenses</strong>. The majority of us have used our licenses to validate our identity, provide proof of our abilities or gain access to specific places and activities.</p> <p>While these activities may seem simple, they depend on a complex relationship of trust between the issuer and reviewer. It’s a relationship in which the driver’s license represents an official certification of who you are and what you can do.</p> <p>At its core, the trust question in<strong> higher education requires three components</strong> to ensure that individuals, organizations and devices have valid access, exchange, use and transfer of information:</p> <ol><li><strong>Security: </strong>Proper security makes it possible for all parties to accept that there have been no unauthorized changes to the information. </li> <li><strong>Validity:</strong> Validity means all parties can accept that the information and identities are authentic. </li> <li><strong>Portability:</strong> Portability allows all parties to access and show information in different environments. Therefore, it appears that to understand fully how technology can support the new vision of student skills attainment, we should first establish how it provides these three components.</li> </ol><h2><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></h2> <h2 id="toc_1">Technology Supports the Trust Framework for Credentials</h2> <p>It should be clear that technology could support the security aspect of the trust framework. <a href="https://edtechmagazine.com/higher/article/2018/09/pain-points-and-solutions-cloud-security-it-teams-perfcon">Identity and access management solutions</a>, for example, have long handled the provisioning and verification of identity, as well as the linking between credentials and identities. </p> <p>Likewise, technology can support the ability to <strong>recognize that a credential is valid</strong> — that is, issued by a recognized authority — similar to the process of identity verification. Last, with the use of portals, students can access their credentials anytime, from anywhere, which would undoubtedly support the portability component of a trust framework.</p> <p>Equally clear, however, is that these technological activities are necessary but not sufficient. For a trust framework to be successful, there must be much <strong>more than simply a technological underpinning</strong>. </p> <p>For example, there must be agreement about the <strong>significance of the shared information and understanding that certain information applies to given contexts</strong>. As with the driver’s license example, there are agreements about what licenses can certify (identity and driving ability) and where they are applicable (between states, but not between countries, for example). </p> <p>Technologies such as blockchain and credentialing platforms may be necessary for the vision of where higher education may go. Yet other pieces of the puzzle are equally important. </p> <p>I hope that<strong> viewing a trust framework through the lens of its key components</strong> — and not in terms of technology — will help us identify and focus our attention on what is necessary to help students attain, store and share demonstrations of their skills over their lifetimes.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/taxonomy/term/11686"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/James%20Wiley.png.jpg?itok=Gj4Y-C7c" width="58" height="58" alt="James Wiley" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/taxonomy/term/11686"> <div>James Wiley</div> </a> </div> <div class="author-bio"> <p> <div><p>James Wiley is the Eduventures principal analyst at ACT.</p> </div> </p> </div> </div> </div> </div> Wed, 13 Mar 2019 15:37:36 +0000 eli.zimmerman_9856 41946 at https://edtechmagazine.com/higher Evaluating Intrusion Prevention Systems in Higher Education https://edtechmagazine.com/higher/article/2019/03/evaluating-intrusion-prevention-systems-higher-education-perfcon <span>Evaluating Intrusion Prevention Systems in Higher Education</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 03/13/2019 - 10:41</span> <div><p>Colleges and universities continue to find themselves the targets of large-scale cyberattacks. Some of these come from foreign sources, such as <a href="https://www.wired.com/story/iran-cyberattacks-us-universities-indictment/" target="_blank">Iranian hackers targeting university professors</a> or <a href="http://fortune.com/2019/03/05/chinese-hackers-targeted-27-universities-to-steal-maritime-research-report-finds/" target="_blank">Chinese attackers seeking out sensitive defense-related research</a>. Others are more mundane, such as the <a href="https://www.wjhl.com/local/etsu-employees-potentially-affected-by-data-breach-connected-to-phishing-scam/1606803834" target="_blank">phishing attack that compromised two East Tennessee State University employees’ email accounts</a>. </p> <p>No matter the source, the bottom line is clear: higher education institutions <strong>have valuable information and resources</strong>, and attackers are actively working to steal those valuable assets.</p> <p>Institutions around the country are turning to intrusion detection and intrusion<b id="docs-internal-guid-058577d8-7fff-733f-0326-e9ff383a65f0"> </b>prevention technology to play an important defensive role against these cyberthreats<b><strong>. </strong></b>The <a href="https://umich.edu/" target="_blank">University of Michigan</a> and <a href="https://www.temple.edu/" target="_blank">Temple University</a> both recently <a href="https://edtechmagazine.com/higher/higher/higher/higher/higher/higher/higher/article/2019/02/intrusion-prevention-systems-prove-key-campus-defense">deployed intrusion prevention technology</a> to protect their networks from attack. Other institutions are either <strong>actively deploying or evaluating intrusion prevention solutions</strong> in an effort to build stronger network perimeters that actively defend against cybersecurity threats — and help keep their name out of the headlines. </p> <p>Let’s take a look at the role of intrusion prevention systems on a campus network, some of the challenges raised by this technology and strategies that institutions can use to evaluate IPS options.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/02/intrusion-prevention-systems-prove-key-campus-defense" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how intrusion prevention systems are crucial for campus defense.</em></a></p> <h2 id="toc_0">The Role of Intrusion Prevention Systems in University Cybersecurity</h2> <p>IPS technology works by <strong>monitoring network traffic and system actions</strong> for signs of malicious activity such as intrusions. Most IPS technology relies on signature detection technology that consults a database of known attack patterns and flags any activity that matches those patterns. When the IPS detects a match, it selects an automated response from a set of options, ranging from logging the activity and alerting an administrator to automatically blocking the traffic to prevent it from entering the network.</p> <p>In a typical IPS deployment, the <strong>institution places a dedicated IPS network device in line with the external internet connection</strong>. This requires a device that is capable of keeping up with the scale of the institution’s network traffic. The device then inspects each network packet as it passes and blocks suspicious activity before it enters the network. </p> <p>This approach allows rapid, automated responses to security threats on campus networks. That shifts the incident response posture from the typical reactive approach used when investigating a suspected incident to a proactive approach that blocks the incident from occurring in the first place.</p> <p><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> <h2 id="toc_1">Challenges to Intrusion Prevention System Deployment</h2> <p>While IPS technology does play an important role in protecting a network from attack, the use of IPS solutions may have drawbacks as well. One major operational challenge comes from the fact <strong>that no security technology is foolproof</strong>. IPS can make errors and incorrectly flag legitimate traffic as potentially malicious. </p> <p>This type of error, known as a false positive alert, may cause significant operational impact because of the proactive nature of an IPS. The system is designed to respond immediately and automatically, without any human intervention. The end result is that <strong>false positive alerts</strong> will automatically block network activity that was actually legitimate, potentially disrupting critical business functions.</p> <p>The second challenge is <strong>scaling IPS to accommodate the bandwidth demands</strong> of a modern educational network. IPS devices deployed in line with a network become a choke point for network activity and must be capable of handling the peak throughput of the network. Otherwise, they risk throttling network activity and disrupting legitimate use. </p> <p>Of course, there’s a trade-off here because IPS devices that are capable of handling high throughput are also extremely expensive. In addition, the implementation of a single IPS device introduces <strong>a single point of failure into a network design</strong>, prompting most organizations to deploy redundant solutions, further increasing the cost of an IPS deployment.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/03/how-get-vital-cybersecurity-messages-resonate-higher-ed" target="_blank"><em><strong>MORE FROM EDTECH:</strong> How to get cybersecurity best practices to resonate in higher education.</em></a></p> <h2 id="toc_2">Kicking off an Intrusion Prevention System Evaluation</h2> <p>While colleges should be cognizant of the challenges posed by IPS technology, these should be seen <strong>simply as design considerations</strong> rather than absolute barriers to deployment. </p> <p>False positives are extremely problematic for IPS deployments and can derail a pilot project if they are not carefully managed. For this reason, administrators planning an IPS deployment should <a href="https://edtechmagazine.com/higher/article/2018/04/higher-ed-security-pros-get-strategic-neutralize-threats">first implement the technology</a> in alert-only mode. </p> <p>This strategy, also known as intrusion detection, lets cybersecurity teams see <strong>how the IPS functions and what type of traffic it alerts on</strong> — without disrupting real-time network activity. Pilot teams can use alert mode as an opportunity to fine-tune the IPS deployment to reduce the number of false positive alerts before deploying the device in intrusion prevention mode.</p> <p>The challenge of scaling an IPS solution to meet the bandwidth demands of a campus internet connection can be even greater if funding isn’t available to purchase appropriately sized devices. In this case, cybersecurity professionals may <strong>approach a pilot project by implementing IPS technology on a smaller-scale network</strong>. Instead of placing the initial IPS device at the campus internet border, it might be deployed to protect a smaller, more sensitive network. </p> <p>For example, an IPS might be used at the perimeter of a campus data center to <a href="https://edtechmagazine.com/higher/article/2018/04/Segment-Your-Campus-Network-for-Stronger-Security">segment off </a>a sensitive research network or to filter traffic headed to a medical center. This initial deployment can add proactive defense to a high-risk area and serve as a proof of concept for a larger deployment.</p> <p>Intrusion prevention technology plays an important role in building a robust, defense-in-depth approach to cybersecurity. Campuses not currently using an IPS should consider <strong>a pilot deployment that allows them to evaluate the technology</strong> in a real-world setting.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/mike-chapple"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/mike_chapple_updated.jpg?itok=PSiizevj" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/mike-chapple"> <div>Mike Chapple</div> </a> </div> <div class="author-bio"> <p> <div><p>Mike Chapple is associate teaching professor of IT, analytics and operations at the University of Notre Dame. </p> </div> </p> </div> </div> </div> </div> Wed, 13 Mar 2019 14:41:40 +0000 eli.zimmerman_9856 41941 at https://edtechmagazine.com/higher Review: Sophos Intercept X Stops Threats at the Gate https://edtechmagazine.com/higher/article/2019/03/review-sophos-intercept-x-stops-threats-gate <span>Review: Sophos Intercept X Stops Threats at the Gate</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Tue, 03/12/2019 - 11:59</span> <div><p>Traditional anti-malware products <strong>scan both memory and disk for particular threat signatures</strong>, which are updated daily (or even more often). But if a new threat appears before the pattern files are updated, these solutions won’t be able to detect or prevent the attack. </p> <p>In an effort to keep ahead of hackers, <a href="https://www.cdwg.com/content/cdwg/en/brand/sophos.html?enkwrd=Sophos" target="_blank">SophosLabs</a> analyzes more than <strong>400,000 new malware samples every day</strong>. The challenge is that the vast majority of malware is unique to individual organizations, so updating a pattern file is an inefficient, ineffective block for these attacks.</p> <p>To fix that, <a href="https://www.cdwg.com/product/sophos-central-intercept-x-advanced-with-edr-subscription-license-3-year/5327937?pfm=srh" target="_blank">Sophos Intercept X</a> sits on top of traditional security software solutions to augment protection. The software prevents malware before it can be executed and stops threats, such as ransomware, from running. When ransomware does get into the network, the tool provides a root cause analysis to help users understand the forensic details.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/05/4-ways-improve-endpoint-protection-your-campus" target="_blank"><em><strong>MORE FROM EDTECH:</strong> Here are four ways universities can improve their endpoint protection.</em></a></p> <h2 id="toc_0">Defeat Ransomware with Automatic Monitoring and File Rollbacks</h2> <p>Intercept X uses deep learning to detect new (and previously unseen) malware and unwanted applications. <a href="https://edtechmagazine.com/higher/article/2018/11/qa-tom-livne-how-ai-enabled-tools-can-help-boost-accessibility-campus">Deep learning</a> is modeled after the human brain, using advanced neural networks that <strong>continuously learn as they accumulate more data</strong>.</p> <p>It’s the same kind of machine learning that powers facial recognition, <a href="https://edtechmagazine.com/higher/article/2018/06/microsoft-teams-rit-boost-student-accessibility-ai-transcription">natural language processing</a> and even self-driving cars, all inside an anti-malware program.</p> <p><img alt="Sheen" data-entity-type="" data-entity-uuid="" src="/higher/sites/edtechmagazine.com.higher/files/Q0219-ST-PR_Sheen-specs.jpg" /></p> <p>Ransomware has grown at a fast clip since the success of the <a href="https://edtechmagazine.com/higher/article/2017/06/hackers-infiltrate-familiar-software-colleges-step-security-efforts">WannaCry malware infection in May 2016</a>. Ransomware installs itself on a computer and then encrypts important files, making them inaccessible to their owner. The owner then receives a message from the attackers that, <strong>in an exchange for currency, they will decrypt the files</strong>. </p> <p>Sophos Intercept X b<strong>locks these attacks by monitoring the file system</strong>, detecting any rapid encryption of files and terminating the process. It even rolls back the changes to the files, leaving them as if they had never been touched — and denying the cybercriminals a payoff.</p> <h2 id="toc_1">Integrated Protections Give Admins Better Visibility</h2> <p>The software offers several additional protections. WipeGuard uses the same deep learning features to protect a computer’s Master Boot Record. (Ransomware attacks on the MBR prevent the computer from restarting — even <strong>restores from backups are impossible until the cybercriminals get their money</strong>.)</p> <p>Safe Browsing includes policies to <strong>monitor a web browser’s encryption</strong>, presentation and network interfaces to detect “man in the browser” attacks that are common in many banking Trojan viruses.</p> <p>Sophos Root Cause Analysis contains a <strong>list of infection types that have occurred in the past 90 days</strong>. There’s even a Visualize tab that connects devices, browsers and websites to track where the infection occurred and how it spread. </p> <p>This doesn’t mean users must take action immediately, but it could help them i<strong>nvestigate the chain of events surrounding a malware infection</strong> and highlight any necessary security improvements.</p> <p>One caveat: If users haven’t patched their software (especially Java and <a href="https://www.cdwg.com/product/adobe-acrobat-pro-2017-license-1-user/4644593?pfm=srh" target="_blank">Adobe</a> applications), Intercept X may detect false positives. Be sure to update all software to the most current versions — always a best practice — to avoid these accidental alerts.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="https://biztechmagazine.com/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> <h2 id="toc_2">Make Management Easier Through Sophos Central Dashboard</h2> <p>Endpoint protection is wonderful, but managing all those endpoints can be a chore. In addition to the usual laptops and desktops, security managers must pay attention to <strong>servers, mobile devices, email </strong><strong>and</strong><strong> web browsing</strong>. The potential threat surface can be overwhelming.</p> <p>Sophos Central streamlines endpoint management, especially when deployed alongside other Sophos products. From the console, admins can manage Intercept X and endpoint protection either globally or by device. Web protection <strong>provides enterprise-grade browsing defense against malicious pop-ups, ads and risky file downloads</strong>. The mobile dashboard also shows device compliance, self-service portal registrations, platform versions and management status. </p> <p>Server security protects both virtual and physical servers. The Server Lockdown feature reduces the possibility of attack by ensuring that a server can <strong>configure and run only </strong><strong>known,</strong><strong> trusted executables</strong>.</p> <p>Sophos wireless, encryption and email products also tie in to the console, and Sophos Wi-Fi access points can work <strong>alongside endpoint and mobile protection clients</strong> to provide integrated threat protection. </p> <p>That lets admins see what’s happening on wireless networks, APs and connecting clients to get insight into the inappropriate use of resources, including rogue APs. </p> <p>The Sophos Encryption dashboard provides centrally managed full-disk encryption using <a href="https://www.cdwg.com/product/windows-10-pro-upgrade-license/3799403?pfm=srh" target="_blank">Windows</a> BitLocker or Mac FileVault. Key management becomes a snap with the SafeGuard Management Center, which lets users recover damaged systems. </p> <p>Sophos email protection<strong> provides a safeguard against spam, phishing attempts </strong><strong>and</strong><strong> other malicious attacks </strong>through the most common user interface of all: email.</p> <p>Sophos Central isn’t just for admins. Self-service is an important feature today, with user demands and IT budgets in constant conflict. </p> <p>Users can log in to the Sophos self-service portal to <strong>customize their security status, recover passwords and get notifications</strong>. In most IT departments, password recovery is the No. 1 help desk request, and eliminating those calls means technicians can spend more time on complex tasks.</p> <h3 id="toc_0">Sophos Intercept X</h3> <p><strong>OS</strong>: Windows 7, 8, 8.1 and 10, 32-bit and 64-bit; macOSz<br /><strong>Speed</strong>: Extracts millions of file features in 20 millisecondsm<br /><strong>Storage Requirement</strong>: 20MB on the endpoint<br /><strong>Server Requirement</strong>: Sophos Central supported on Windows 2008R2 and above</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/higher/higher/author/jeffrey-sheen"> <div>Jeffrey Sheen</div> </a> </div> <div class="author-bio"> <p> <div><p>Dr. Jeffrey Sheen currently works as the supervisor of enterprise architecture services for Grange Mutual Casualty Group of Columbus, Ohio.</p> </div> </p> </div> </div> </div> </div> Tue, 12 Mar 2019 15:59:28 +0000 eli.zimmerman_9856 41936 at https://edtechmagazine.com/higher Law Schools Escalate Their Focus on Digital Skills https://edtechmagazine.com/higher/article/2019/03/law-schools-escalate-their-focus-digital-skills <span>Law Schools Escalate Their Focus on Digital Skills</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Mon, 03/11/2019 - 10:56</span> <div><p>The law industry is using innovative test design and new technology curricula in law schools to make their graduates more effective employees.</p> <p>Research shows law firms benefit greatly from digital integration. Law firms can use technology to increase project delivery by <strong>63 percent</strong> and decrease legal and compliance risk by <strong>43 percent</strong>, according to a <a href="https://www.gartner.com/en/newsroom/press-releases/2018-12-12-gartner-says-81-percent-of-legal-departments-are-unprepared-for-digitalization" target="_blank">2018 Gartner report</a>. </p> <p>However, only <strong>19 percent</strong> of legal teams fall into this category, creating a need for future law school students to be technically savvy by the time they graduate.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/08/why-more-law-schools-are-prioritizing-technology-integration" target="_blank"><em><strong>MORE FROM EDTECH:</strong> See how law schools are moving towards digital transformation.</em></a></p> <h2 id="toc_0">Law School Entrance Exam Moves Exclusively Online</h2> <p>Reflecting that shift, the Law School Admission Council, which organizes and distributes the Law School Admission Test, will be <a href="https://www.lsac.org/about/news/lsac-announces-technology-collaboration-microsoft" target="_blank">offering the test exclusively</a> on <a href="https://www.cdwg.com/product/microsoft-surface-go-10-pentium-gold-4415y-8gb-ram-128gb-ssd-edu-silver/5178174" target="_blank">Microsoft Surface Go tablets</a> starting in July 2019.</p> <p>The transition is meant to speed up the digital transformation of a profession that<a href="https://www.forbes.com/sites/markcohen1/2018/12/20/law-is-lagging-digital-transformation-why-it-matters/#19f219ff515c" target="_blank"> has started to fall behind other industries</a>, according to LSAC officials.</p> <p>“Legal education and the legal profession need to keep pace with technological advancements,” said Kellye Testy, president and CEO of LSAC. </p> <p>Using Microsoft Surface Go devices will also <strong>improve test accessibility</strong>, said Troy Lowry, senior vice president of technology products and CIO at LSAC. </p> <p>The initial set of tools built into the <strong>devices include screen readers and icon magnifiers</strong>, which let applicants adjust the view to make sure they can read and understand questions. </p> <p>Microsoft and LSAC will be working together to build more accessibility features in the future as well, said Lowry.</p> <h2 id="toc_1">Law Schools Teach Real-World Implications of Digital Transformation</h2> <p>At innovative law schools, professors are <strong>using real-world examples to show students how attorneys can integrate</strong> technology into their practices.</p> <p>At the <a href="https://law.hofstra.edu/" target="_blank">Hofstra University Maurice A. Deane School of Law</a>, students are using <a href="https://www.cdwg.com/product/apple-9.7-inch-ipad-wi-fi-6th-generation-tablet-32-gb-9.7/5035159" target="_blank">Apple iPad devices</a> in mock trials to access case files and present evidence, <a href="https://www.newsday.com/long-island/education/hofstra-law-school-technology-1.23808441" target="_blank"><em>Newsday</em> reports</a>.</p> <p>Through the TrialPad application, students can organize their arguments and zoom in on images of evidence when questioning witnesses.</p> <p>“What we’re trying to do is give our students an opportunity to explore not just where the practice of law is now, but where it’s headed,” said Courtney Selby, a Hofstra professor, associate dean for information services and director of the college’s Law Library. “We’re trying to <strong>give them the opportunity to see a little bit into the future</strong> of their own professional lives.” </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-trends.html"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/healthtechmagazine.net/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2 id="toc_2">Coding and Data Analytics Skills Make Law Students More Efficient</h2> <p>At the <a href="https://www.tourolaw.edu/" target="_blank">Touro College Jacob D. Fuchsberg Law Center</a>, students are learning to construct automated information systems to collect client information.</p> <p>With these coding skills, students can reduce the time it takes to conduct client assessments.</p> <p>Similarly, students at the <a href="https://law.ku.edu/" target="_blank">University of Kansas School of Law</a> had the opportunity to take the institution’s first legal analytics course at the end of last year, <a href="https://www.law.com/legaltechnews/2018/12/26/university-of-kansas-school-of-law-brings-ai-to-the-classroom/" target="_blank">Legaltech News reports</a>.</p> <p>Participants learned to use <strong>analytics programs and artificial intelligence</strong> to complete work in a fraction of the time it usually takes. </p> <p>For example, students analyzed contracts using AI programs to find errors and areas for improvement across various legal jurisdictions. In another exercise, students learned to <strong>use data programs to draft nondisclosure agreements</strong> in less than half an hour.</p> <p>By learning analytics models, students will graduate with the skills to make them more effective — and more employable — professionals.</p> <p>“As advancing technology and massive data sets <strong>enable lawyers to answer complex legal questions with greater speed and efficiency</strong>, courses like Legal Analytics will help KU Law students be better advocates for tomorrow’s clients and more competitive for tomorrow’s jobs,” Stephen Mazza, dean of the University of Kansas School of Law, tells Legaltech News.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/eli-zimmerman"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/eliheadshot.jpg?itok=dbOQBwFz" width="58" height="58" alt="eli headshot" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/eli-zimmerman"> <div>Eli Zimmerman</div> </a> </div> <div class="author-bio"> <p> <div><p>Eli is Associate Editor for <em>EdTech Magazine Higher Education</em>. When not in the office, Eli is busy scanning the web for the latest podcasts or stepping into the boxing ring for a few rounds.</p> </div> </p> </div> </div> </div> </div> Mon, 11 Mar 2019 14:56:05 +0000 eli.zimmerman_9856 41931 at https://edtechmagazine.com/higher