EdTech Magazine - Technology Solutions That Drive Education https://edtechmagazine.com/higher/rss.xml en Universities Need to Prepare Liberal Arts Students for a Tech-Enabled World https://edtechmagazine.com/higher/article/2019/01/universities-need-prepare-liberal-arts-students-tech-enabled-world <span>Universities Need to Prepare Liberal Arts Students for a Tech-Enabled World</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 01/16/2019 - 20:07</span> <div><p>As automation and other technological advances change the way industries do work, employers are finding they need employees equipped with a mix of technical and communication skills. </p> <p>This is a noticeable shift. Students graduating with STEM majors have, until recently, <strong>been seen as more marketable than their liberal arts counterparts</strong>, with<a href="https://www.usnews.com/news/education-news/articles/2018-05-17/liberal-arts-programs-struggle-to-make-a-case-for-themselves" target="_blank"> some experts even wondering</a> whether liberal arts programs are worth maintaining.</p> <p>Yet new evidence shows liberal arts majors are snapping up jobs across sectors, even in the tech sphere, according to a <a href="https://www.economicmodeling.com/robot-ready-reports/" target="_blank">report</a> from the <a href="http://www.stradaeducation.org/institute/" target="_blank">Strada Institute for the Future of Work</a>. </p> <p>“Between <strong>2010 and 2013</strong>, the growth of liberal arts majors entering the technology industry from undergrad outpaced that of computer science and engineering majors by <strong>10 percent</strong>,” Strada authors write. “Companies are looking for intellectual dexterity just as much as they need technical expertise.”</p> <p>This trend continues today, <strong>incentivizing liberal arts colleges</strong> and programs at larger universities to incorporate lessons in hard and soft skills. </p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/universities-invest-cybersecurity-pathways-add-workforce" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Universities invest in ways to close the cybersecurity skills gap.</em></a></p> <h2 id="toc_0">Liberal Arts Students Learn to Work with Robots, Not Against Them</h2> <p>The <strong>introduction of automation tools</strong> in the workplace means certain work responsibilities will move away from humans, shifting the focus on what skills are necessary. </p> <p>“Future workers will need to flex their human skills — their <strong>higher order mental capacities</strong> <strong>and ability to work with ideas</strong> and think divergently — to distinguish themselves alongside the miraculous machines of the future,” the report’s authors write. </p> <p>The anticipation of robots and humans working in tandem means not only will employees need to work on their communication skills, but on their familiarity with robotics and AI as well.</p> <p>Many universities <strong>already have the capabilities for AI integration</strong>, using tools like <a href="https://www.cdw.com/content/cdw/en/brand/ibm.html?enkwrd=IBM" target="_blank">IBM</a> <a href="https://edtechmagazine.com/higher/article/2018/03/universities-deploy-chatbots-aid-students-admissions-process-and-beyond">Watson</a> to help with admissions or <a href="https://www.cdw.com/content/cdw/en/brand/microsoft-interstitial.html?enkwrd=Microsoft" target="_blank">Microsoft</a> <a href="https://www.cdw.com/search/?key=Azure&amp;ctlgfilter=&amp;searchscope=all&amp;sr=1" target="_blank">Azure</a> for <a href="https://edtechmagazine.com/higher/article/2018/06/educators-tailor-services-individual-students-ai">personalized learning</a>. </p> <p>In the classroom, however, some liberal arts educators may not have the expertise in emerging technologies to pass along to their students.</p> <p>Microsoft executives have affirmed <a href="https://www.businessinsider.com/microsoft-president-says-tech-needs-liberal-arts-majors-2018-1" target="_blank">the company’s commitment to bringing liberal arts graduates into tech</a>, and the tech giant has released training modules to <strong>teach students how to navigate their AI platforms</strong>.</p> <p>"If AI is to reach its potential in serving humans, then every engineer will need to learn more about the liberal arts and every liberal arts major will need to learn more about engineering," Microsoft President Brad Smith and Executive Vice President of AI and Research Harry Shum wrote in their book <a href="https://blogs.microsoft.com/blog/2018/01/17/future-computed-artificial-intelligence-role-society/" target="_blank"><em>The Future Computed</em></a>.</p> <h2 id="toc_1">Combine Data Analytics for More Effective Communication</h2> <p>Industries are eager for employees <strong>proficient in data science</strong> as information becomes an increasingly powerful currency across sectors. </p> <p>Among companies in areas that usually hire liberal arts graduates, like journalism or marketing, “a strong job candidate would need to demonstrate several more technical skills in <strong>information technology (IT), business, or design</strong> in addition to the core skills of writing and communication,” Strada authors write. </p> <p>“[J]ournalism is becoming almost an IT field with an increased need for skills and analytics capabilities like search engine optimization, JavaScript, CSS, HTML, and <a href="https://www.cdw.com/content/cdw/en/brand/google-interstitial.html?enkwrd=Google" target="_blank">Google</a> analytics.”</p> <p><a href="https://edtechmagazine.com/higher/article/2018/04/4-things-universities-need-know-teach-data-science">Data science is easily translated</a> into liberal arts courses. For example, <a href="https://www.boisestate.edu/" target="_blank">Boise State University</a> now offers a degree specifically designed around <a href="https://www.boisestate.edu/data-la/" target="_blank">data science for the liberal arts</a>. </p> <p>Other universities, like the <a href="http://www.uh.edu/" target="_blank">University of Houston</a> and the <a href="http://www.mit.edu/" target="_blank">Massachusetts Institute of Technology</a>, are <strong>building facilities designed specifically for data science </strong>exploration in both STEM and other fields. </p> <p>The most important thing, according to the Strada authors, is for <strong>educators to understand where the modern workforce is headed</strong>, and to adjust their curricula to reflect the skills that employers will be looking for.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/modern-workforce.html?cm_mmc=Vanity-_-modernworkforce-_-NA-_-042018" target="_blank"><img alt="Modern-Workforce_insight3.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/biztechmagazine.com/files/Modern-Workforce_insight3.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/eli-zimmerman"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/eliheadshot.jpg?itok=dbOQBwFz" width="58" height="58" alt="eli headshot" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/eli-zimmerman"> <div>Eli Zimmerman</div> </a> </div> <div class="author-bio"> <p> <div><p>Eli has been eagerly pursuing a journalistic career since he left the University of Maryland's Philip Merrill School of Journalism. Previously, Eli was a staff reporter for medical trade publication <em>Frontline Medical News,</em> where he experienced the impact of continuous education and evolving teaching methods through the medical lens. When not in the office, Eli is busy scanning the web for the latest podcasts or stepping into the boxing ring for a few rounds.</p> </div> </p> </div> </div> </div> </div> Thu, 17 Jan 2019 01:07:55 +0000 eli.zimmerman_9856 41771 at https://edtechmagazine.com/higher EdTech Launches New Insider Program for Personalized Content https://edtechmagazine.com/higher/article/2019/01/edtech-launches-new-insider-program-personalized-content <span>EdTech Launches New Insider Program for Personalized Content</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 01/16/2019 - 15:22</span> <div><p>As an IT leader, you’re swamped when it comes to keeping up with the latest and greatest in ed tech. You count on us to advise you on IT management and general tech know-how. But there’s so much to sift through across social media, online searches and hallway conversations. That’s why we’ve taken the time to reimagine our Insider program in a way that’s <strong>smarter, more user-friendly and ultimately, more valuable</strong>.</p> <p>I’m proud to share how <em>EdTech: Focus on Higher Education</em> now brings mission-critical information to you through our new, smarter <a href="https://edtechmagazine.com/higher/cdw_insider_registration/register-web"><em>EdTech</em> Insider program</a>. </p> <p>EdTech insiders <strong>gain access to personalized content recommendations</strong> and our most in-depth, premium articles, videos and more. Insiders can unlock access to white papers, view daily fast facts, save articles to read later and weigh in on trending topics through Insider polls.</p> <p><a href="https://edtechmagazine.com/higher/cdw_insider_registration/register-web" target="_blank"><em><strong>GET STARTED: </strong>Register for the EdTech Insider Program.</em></a></p> <h2>Edtech Insider Dashboard Adapts to Your Interests</h2> <p>What I find most exciting about the new Insider content dashboard is <strong>that the more you use it, the smarter it gets</strong>. Insiders select the topics and subjects they want to learn more about or that affect their day-to-day, and receive personalized Insider updates based on those preferences. That means you can easily read what’s important to you first, when you want it, without having to lose time on a search or perusing nonessentials. </p> <p>When content catches your eye, but you don’t have time to read, tap or click a flag found on <strong>every article or video to save it in your library</strong> and quickly access it later.</p> <p>Beyond the cool factor of having articles served up based on your personalized interests and reading habits, <em>EdTech</em> Insider also offers users access to a <strong>growing library of exclusive content</strong> not available to the general website or print magazine audiences. You won’t want to miss out on what’s in store.</p> <p>Visit <a href="https://edtechmagazine.com/higher/cdw_insider_registration/register-web">edtechmag.com/higher/register</a> to become an Insider today. There, you can also renew or sign up to receive a print subscription, as well as our e-newsletter, which brings must-read content to your inbox twice a month.</p> <p>Thank you for making EdTech a part of your work day. As always, we’re here to help.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/ryan-petersen"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/ryan-petersen-2013-headshot.jpg?itok=iV6msfy0" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/ryan-petersen"> <div>Ryan Petersen</div> </a> <a target="_blank" class="google-plus" href="https://plus.google.com/110888965639568833839/posts?rel=author"><span>Google+</span></a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=RyanPete&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Ryan has been a magazine and newspaper editor for 18 years, with the last 12 covering a variety of bases for CDW’s family of tech magazines. As Editor in Chief, he works on developing editorial strategy and is always on the lookout for new writing talent and sharing great stories with the IT world. In his spare time, Ryan enjoys spending time with his family, biking and obsessively following Iowa Hawkeye sports and Cubs baseball.</p> </div> </p> </div> </div> </div> </div> Wed, 16 Jan 2019 20:22:26 +0000 eli.zimmerman_9856 41766 at https://edtechmagazine.com/higher How Universities Can Mitigate IoT Risk on Campus https://edtechmagazine.com/higher/article/2019/01/how-universities-can-mitigate-iot-risk-campus <span>How Universities Can Mitigate IoT Risk on Campus</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Tue, 01/15/2019 - 12:19</span> <div><p>Universities are experiencing an <strong>exponential growth of </strong><strong>Internet</strong><strong> of Things devices</strong>, which means university IT teams will need to increase their security measures to ensure their campuses are protected.</p> <p>In 2017, hackers broke into an unnamed university’s network by attacking more than <strong>5,000</strong> IoT connected devices on campus, according to<a href="https://www.cdw.com/search/?b=VZN&amp;enkwrd=Verizon" target="_blank"> Verizon</a>’s “<a href="https://enterprise.verizon.com/resources/reports/data-breach-digest/" target="_blank">2017 Data Breach Digest</a>” report. </p> <p>While the technology behind IoT devices has improved over the past year, <a href="https://edtechmagazine.com/higher/article/2018/12/3-cybersecurity-focus-areas-education-institutions-2019">hackers have also become more sophisticated</a>, which means universities cannot ignore the possibility of a threat. </p> <p>“In two short years, there could be nearly <strong>30 billion </strong>autonomous <a href="https://edtechmagazine.com/higher/article/2018/06/4-innovative-internet-things-applications-horizon" target="_blank">Internet of Things devices</a> on our networks,” <a href="https://edtechmagazine.com/higher/article/2018/09/why-iot-security-requires-interdisciplinary-approach">says</a> Perry Alexander, director of the Information and Telecommunication Technology Center at the <a href="https://ku.edu/" target="_blank">University of Kansas</a>. “Unlike computers and smartphones, these sensors, appliances, controllers and other devices talk to each other without requiring human interaction.”</p> <p><a href="https://edtechmagazine.com/higher/article/2018/06/4-innovative-internet-things-applications-horizon" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Check out how higher education institutions are using IoT devices on campus.</em></a></p> <h2 id="toc_0">Secure IoT Devices on Campus Through Action with Intent</h2> <p>Among the various strategies to protect connected devices on campus, one factor stands out clearly: <strong>intent</strong>. </p> <p>“It is not just about enterprise security around data risk or data leaking or hacking. It is really about <strong>how we use the data coming from IoT to make decisions properly</strong>,” says Anthony Salcito, vice president of education for <a href="https://www.cdw.com/content/cdw/en/brand/microsoft-interstitial.html?enkwrd=Microsoft" target="_blank">Microsoft</a>. “A lot of collections and centers are not being integrated and aggregated to experiences about keeping kids safe, to make the campus life more valuable and efficient. I think those are the things we have got to push on.”</p> <p>At <a href="http://www.montana.edu/" target="_blank">Montana State University,</a> IT administrators implemented intent-based networking to help understand how the campus network is used. </p> <p><script type="text/javascript" src="//sc.liveclicker.net/service/getEmbed?client_id=1526&amp;widget_id=1237165679&amp;width=640&amp;height=360"></script></p> <p>Having a deep understanding of students’ intentions on the network helps the campus security team by making them more aware of <strong>an access request that seems out of place</strong>. </p> <p>“We basically get a fingerprint of the student experience, and we can scale that in software to make the network personal for our users regardless of where they are on campus,” says Jerry Sheehan, CIO of MSU. “That also makes things more secure, because we understand the intention of what the student is attempting to do, and we can make sure that the network allows that to happen.”</p> <p>Another way to ensure a more secure IoT network is for <strong>campus IT teams to be the ones to install them across campus</strong>. This gives them the power to strategize about where IoT devices should live around campus for maximum security and efficiency. </p> <p>At <a href="https://www.vcu.edu/" target="_blank">Virginia Commonwealth University</a>, CIO Alex Henson and his team deployed IoT devices across the campus, and they work with the CISO and campus police to ensure campus and IoT security. </p> <p>In addition to choosing where the devices go, Henson and his team segment their network to ensure minimal damage if a breach were to occur.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/eli-zimmerman"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/eliheadshot.jpg?itok=dbOQBwFz" width="58" height="58" alt="eli headshot" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/eli-zimmerman"> <div>Eli Zimmerman</div> </a> </div> <div class="author-bio"> <p> <div><p>Eli has been eagerly pursuing a journalistic career since he left the University of Maryland's Philip Merrill School of Journalism. Previously, Eli was a staff reporter for medical trade publication <em>Frontline Medical News,</em> where he experienced the impact of continuous education and evolving teaching methods through the medical lens. When not in the office, Eli is busy scanning the web for the latest podcasts or stepping into the boxing ring for a few rounds.</p> </div> </p> </div> </div> </div> </div> Tue, 15 Jan 2019 17:19:48 +0000 eli.zimmerman_9856 41761 at https://edtechmagazine.com/higher Cloud Access Security Brokers Give IT Staff Visibility and Oversight https://edtechmagazine.com/higher/article/2019/01/cloud-access-security-brokers-give-it-staff-visibility-and-oversight <span>Cloud Access Security Brokers Give IT Staff Visibility and Oversight</span> <span><span lang="" about="/higher/k12/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Mon, 01/14/2019 - 12:23</span> <div><p>Colleges and universities are rapidly <a href="https://edtechmagazine.com/higher/article/2018/11/purdue-university-global-offers-degree-boost-cloud-security-skills-infographic">expanding their use of cloud services</a>, ranging from <strong>complete infrastructure deployments to specialized applications</strong>. This leaves cybersecurity teams in the difficult position of trying to track the flow of sensitive information.</p> <p>Although they may have tools in place to <strong>track the presence of sensitive information</strong> within internal systems, this process becomes far more complicated when employees use cloud services. Cloud access security brokers can help resolve this complexity.</p> <p>The issues that arise from employee use of cloud services come in two forms. First, employees may use cloud services <strong>without the knowledge of IT staff</strong>. They might discover a new service on their own, open an account, then transfer sensitive information into the cloud account. </p> <p>But the danger doesn’t stop there. Even when employees use vetted and approved cloud services, they might configure security settings that violate institutional policies. For example, an employee using an approved cloud storage service might <strong>share a file using a personal email address</strong>, or even accidentally make a file available on the public web.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/pain-points-and-solutions-cloud-security-it-teams-perfcon" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how your team can overcome common cloud security pain points.</em></a></p> <h2 id="toc_0">What Is a Cloud Access Security Broker?</h2> <p>CASBs are technology solutions that <strong>insert themselves between the end user and a cloud service</strong>, injecting security controls that enforce the desired security policy.</p> <p>They allow colleges to enforce internal requirements for <strong>access control, authentication, encryption, firewalling, malware protection, monitoring, data loss prevention </strong><strong>and</strong><strong> content filtering</strong>, even when the data being protected resides in external systems.</p> <p>CASB solutions come in two primary forms. They can exist as on-premises devices that sit on the network in a location where they can intercept and inspect traffic headed to the cloud. These solutions are effective across a wide range of cloud services, but require the user to send traffic through the device.</p> <p>CASBs can also exist as a cloud-based solution that leverages application programming interfaces to interact with cloud services. These solutions can <strong>reach deeply into a cloud service and perform detailed monitoring</strong>, but they are unable to detect the use of cloud services where the institution lacks an enterprise agreement.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/01/qa-patrick-sullivan-using-zero-trust-networks-boost-higher-ed-cybersecurity" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Security expert weighs in on how campuses should secure their networks in 2019.</em></a></p> <h2 id="toc_1">How Can CASBs Help Campus IT?</h2> <p><a href="https://biztechmagazine.com/article/2018/08/casbs-provide-visibility-companies-cloud-based-blind-spots" target="_blank">CASBs may be quickly gaining steam in the private sector</a>, but adoption may lag in higher education when technology leaders don’t see the direct benefits of these solutions. Let’s take a quick look at <strong>three ways that CASBs can play an important role at a college</strong>.</p> <ol><li><strong>CASBs provide visibility into cloud utilization.</strong> One of the primary advantages offered by CASBs is that they give IT staff insight into how faculty, staff and students are using the cloud. This includes the detection of “shadow IT” services where individuals may have adopted cloud services without appropriate security vetting, as well as the misuse of approved cloud services. CASBs provide a wealth of monitoring and enforcement capabilities that prevent employees from intentionally or unintentionally violating a security policy.  For example, a college might use a CASB to scan its cloud-based file sharing service for the presence of publicly accessible information. These scans invariably uncover files and folders containing sensitive information that a faculty or staff member accidentally shared on the web.</li> <li><strong>CASBs offer data loss prevention capabilities. </strong>Many colleges already deploy data loss prevention services on their own networks, but these systems lack visibility into the movement of data within a cloud service. CASBs can extend DLP policies into the cloud by examining the data placed into the cloud and monitoring sensitive data for DLP violations. If the institution prohibits the storage of Social Security numbers in the cloud, for example, IT staff can configure the CASB to enforce this rule. The CASB can scan existing content in the cloud service to search for unauthorized content, as well as block future attempts to move offending content into the cloud.</li> <li><strong>CASBs inject encryption into the cloud.</strong> Encryption is a tried and true security control for the protection of sensitive information that leaves the direct control of its owner. IT staffers have long relied on encryption to reduce the sensitivity level of information stored in the cloud, but they also face the choice of implementing the encryption themselves or placing the encryption keys in the hands of the cloud provider. CASBs mitigate this risk by introducing encryption before the data reaches the cloud service and handling key management tasks. For example, staffers might configure the CASB to intercept and encrypt all files heading to the cloud and then transparently decrypt data returning from the cloud. This gives the end user a seamless experience, while dramatically reducing the impact of a breach at the cloud provider. Cloud computing holds great promise for higher education, offering faculty, staff and students access to a wide range of capabilities that allow them to better carry out their teaching and research missions. CASBs help mitigate the risks associated with cloud computing, smoothing the road to adoption.</li> </ol><p><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> <div class="sidebar_wide"> <h2 id="toc_2">How to Use CASBs Within Data Storage Regulations</h2> <p>Colleges often face federal and state requirements that limit the storage of certain categories of data to locations within the United States. The global architecture of many cloud services can make it a challenge to meet this requirement. That puts data sovereignty requirements as a barrier square in the path of cloud computing initiatives.</p> <p>As a solution, colleges can leverage CASBs in two ways to stay compliant with sovereignty requirements. First, they may continue to negotiate data residency requirements with cloud providers on a case-by-case basis and then use the visibility functionality of a CASB to detect the use of providers without negotiated data residency agreements. Second, they can use the DLP features of a CASB to restrict the flow of regulated information to providers that don’t meet the residency requirements for each category of information.</p> </div> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/higher/higher/higher/k12/author/mike-chapple"><img src="/higher/higher/higher/higher/k12/sites/edtechmagazine.com.higher/files/styles/face_small/public/mike_chapple_updated.jpg?itok=PSiizevj" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/higher/higher/higher/k12/author/mike-chapple"> <div>Mike Chapple</div> </a> </div> <div class="author-bio"> <p> <div><p>Mike Chapple is associate teaching professor of IT, analytics and operations at the University of Notre Dame. </p> </div> </p> </div> </div> </div> </div> Mon, 14 Jan 2019 17:23:45 +0000 eli.zimmerman_9856 41756 at https://edtechmagazine.com/higher Data Programs Gain Traction on Campuses, but Complexity Remains https://edtechmagazine.com/higher/article/2019/01/data-programs-gain-traction-campuses-complexity-remains <span>Data Programs Gain Traction on Campuses, but Complexity Remains</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Fri, 01/11/2019 - 09:42</span> <div><p>With cheaper storage and better collection methods, it’s much easier for higher education institutions to amass mountains of data. Chipping away at that mountain to make sense of the data is another story.</p> <p>Anywhere from about <a href="https://edscoop.com/survey-universities-are-investing-in-data-analytics/" target="_blank">40 percent to 60 percent</a> of colleges and universities have a data analytics program in place, but <a href="https://www.ellucian.com/assets/en/white-paper/whitepaper-increasing-insights-across-institution-ovum.pdf" target="_blank">a survey by Ovum</a> reports that many of those initiatives aren’t fully matured. Only <strong>27 percent of universities</strong> consider their data analytics programs to be advanced or complete, and more than half (<strong>54 percent</strong>) are in the planning or early implementation stages.</p> <p><a href="https://edtechmagazine.com/higher/new-frontier-campus-leaders-discuss-data-analytics-higher-education" target="_blank"><em><strong>MORE FROM EDTECH:</strong> University leaders discuss how best to use data analytics.</em></a></p> <h2 id="toc_0">Data Initiatives Drive Improvements in Academic Performance</h2> <p>Despite the promise of Big Data, there are <a href="https://edtechmagazine.com/higher/article/2018/06/university-leaders-disagree-how-use-data-analytics-survey-finds">well-known barriers</a> to gaining insights. Campus staff may disagree on how to best use it: for <strong>teaching and learning, student retention or operational efficiency</strong>? Leadership buy-in and financial concerns also come into play.</p> <p>Institutions may lack <a href="https://www.mckinsey.com/industries/social-sector/our-insights/how-higher-education-institutions-can-transform-themselves-using-advanced-analytics" target="_blank">good data hygiene</a>, making it difficult for data from one source to work with data from another. And finally, there’s the human factor: Sometimes <a href="https://edtechmagazine.com/higher/article/2018/04/qa-harvard-strategic-data-projects-miriam-greenberg-on-better-data-better-decisions">stakeholders from different departments</a> may simply not want to share data.</p> <p>When universities do Big Data right, the results can make a significant difference to students and to institutional success. Learning from and reacting to data as it’s generated <strong>allows universities to create timely, campuswide initiatives </strong>that can be scaled up or down and continuously measured and refined for even better outcomes. Here are some ways universities are using data analytics to produce actionable results:</p> <ul><li><a href="https://www.temple.edu/" target="_blank">Temple University</a> created an <a href="https://hechingerreport.org/temple-university-spending-millions-get-students-college-cheaper-way/" target="_blank">“early alert” system using predictive analytics</a> to identify at-risk students. The system increased sophomore retention by <strong>12 percent </strong>and the four-year graduation rate b<strong>y 24 percent</strong>.</li> <li>A research team from the <a href="https://www.wisc.edu/" target="_blank">University of Wisconsin</a> and the <a href="https://www.upenn.edu/" target="_blank">University of Pennsylvania</a> implemented a data-driven program to <a href="https://www.gse.upenn.edu/pdf/cmsi/using_educational_data.pdf" target="_blank">increase learning and retention</a> at <strong>12 institutions serving minorities</strong>.</li> <li><a href="https://www.gsu.edu/" target="_blank">Georgia State University</a> has been called a <a href="http://www.lonestar.edu/multimedia/The Promise and Peril of Predictive Analytics in Higher Education.pdf" target="_blank">“national model”</a> for creating a <a href="https://www.impatientoptimists.org/Home/Posts/2016/01/Data-Fueling-Scale-and-Change-in-Higher-Education#.XBvve1xKi03" target="_blank">predictive analytics and intervention program</a> to help underserved students and increase graduation rates by <strong>22 percent</strong>.</li> </ul><p><a href="https://edtechmagazine.com/higher/article/2018/10/qa-kandice-porter-explains-how-data-analytics-helped-failure-rates-plummet" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how Kennesaw State University cut failure rates in half through a data-driven program.</em></a></p> <h2 id="toc_1">Strong Foundations Help Data Programs Succeed</h2> <p>Even institutions that are fully committed to expanding the use of data analytics programs can’t implement them without crucial technical help, such as hardware, software and human resources training. Foundational support can include:</p> <ul><li><strong>Strong, standardized infrastructure: </strong>In an <a href="https://www.higheredtoday.org/2017/12/13/big-data-campus/" target="_blank">article for Higher Education Today</a>, authors Jonathan Gagliardi and Philip Wilkinson note that campuses need both a technical backbone for data analytics and skilled professionals.</li> <li><strong>Intuitive user interface and reporting:</strong> In its report “<a href="https://www.ellucian.com/assets/en/white-paper/whitepaper-increasing-insights-across-institution-ovum.pdf" target="_blank">Increasing Insights Across the Institution,</a>” Ovum recommends researching a wide range of data analytics products. Today’s software tools are designed to be user-friendly, making it possible for a broader range of campus staff to be involved in designing and presenting data analysis.</li> <li><strong>Vendor transparency: </strong>Authors of the “<a href="https://www.newamerica.org/education-policy/reports/predictive-analytics-in-higher-education/" target="_blank">Predictive Analytics in Higher Education</a>” report emphasize that leaders need to thoroughly understand what they are buying. “To ensure models and algorithms are sound, transparent and free from bias, you must be intimately involved with or knowledgeable about how predictive models and algorithms are built,” they write.</li> </ul></div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/erika-gimbel"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/erika-gimbel.jpg?itok=COBsR_2x" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/erika-gimbel"> <div>Erika Gimbel</div> </a> </div> <div class="author-bio"> <p> <div><p>Erika Gimbel is a Chicago-based freelance writer who specializes in B2B technology innovation and educational technology.</p> </div> </p> </div> </div> </div> </div> Fri, 11 Jan 2019 14:42:44 +0000 eli.zimmerman_9856 41751 at https://edtechmagazine.com/higher Q&A: Patrick Sullivan on Using Zero-Trust Networks to Boost Higher Ed Cybersecurity https://edtechmagazine.com/higher/article/2019/01/qa-patrick-sullivan-using-zero-trust-networks-boost-higher-ed-cybersecurity <span>Q&amp;A: Patrick Sullivan on Using Zero-Trust Networks to Boost Higher Ed Cybersecurity</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Thu, 01/10/2019 - 11:41</span> <div><p>Higher education institutions may need to rethink their network protection strategies to make sure student data is secure, and <strong>zero-trust networks</strong> may be the solution. </p> <p>The education sector was particularly vulnerable to cyberattacks last year, <a href="https://edtechmagazine.com/higher/article/2018/12/3-cybersecurity-focus-areas-education-institutions-2019">a study found in mid-December</a>, and security experts are concerned that 2019 will bring a new round of threats that are more sophisticated than ever. </p> <p>“No industry or institution is immune from cyberattacks, not even Harvard,” says Akamai global director Patrick Sullivan. “Thousands of students — often from all over the world — access the internet at colleges and universities, and bring <strong>any vulnerabilities or malware their computers pick up off-campus</strong> with them.” </p> <p><em>EdTech</em> spoke with Sullivan about how a new network access structure may help universities better guarantee the privacy and protection of network users on campus.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/why-iot-security-requires-interdisciplinary-approach" target="_blank"><em><strong>MORE FROM EDTECH:</strong> Universities' network security agendas can benefit from an interdisciplinary approach.</em></a></p> <h2><strong style="color: #c74037;">EDTECH: </strong>What do you make of the state of cybersecurity in the education sector over the past year?</h2> <p><strong>Sullivan:</strong> I would say there are two sides to security: One is the <a href="https://edtechmagazine.com/higher/article/2018/06/faqs-how-choose-between-penetration-tests-and-vulnerability-scans">vulnerability side</a> — in other words, how vulnerable a given organization is. The other side is what the threat landscape looks like for that particular group. </p> <div style="padding: 5px; width: 299px; color: rgb(236, 236, 236); margin-bottom: 10px; margin-left: 15px; float: right; background-color: rgb(51, 51, 51);"><img alt="" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/higher/sites/edtechmagazine.com.higher/files/Patrick%20Sullivan_0.png" style="width: 299px; height: 382px;" title="“Dan" /><br /><span style="color: #939393; font-size: 10px;">Photo: Courtesy of Akamai</span> <div style="font-size: 18px;">Patrick Sullivan, Global Director of Security, Akamai.</div> </div> <p>If you have relatively poor security, but you know there is a lack of interested adversaries, that may not be so bad. But what jumped out at me most about education cybersecurity last year was that the <strong>assessment of security posture was considered to be so poor</strong>, despite so much interest on the part of adversaries to go after that, particularly in higher education. </p> <p>Earlier this year, the Department of Justice went after nation-state actors overseas who had been pilfering terabytes and terabytes of highly valuable intellectual property. </p> <p>These arrests can be interpreted as a trend of bad actors looking to infiltrate education institutions, where <strong>outside organizations are turning to them to be their outsourced R&amp;D departments</strong>.</p> <p>The issue is that the partner organization itself may have great security posture — it may be a government organization or a high-tech company — but if they're partnering with education and depending on them for some of the most critical elements of their research, which leads to the most valuable IP, that could <strong>potentially be a goldmine for adversaries</strong>. </p> <h2><strong style="color: #c74037;">EDTECH: </strong>What was it about higher education institutions that made adversaries so interested?</h2> <p><strong>Sullivan:</strong> Well, education in general is a highly <strong>transitory kind of environment</strong>. The fact that you have people coming and going so frequently rather having a more stable environment presents a set of challenges.</p> <p>This means typically there are less rigorous controls over things you can do on a university network. Usually <strong>security has a little bit of a lighter touch</strong> than what you would find on the other end of the spectrum at a financial firm or government organization. </p> <h2><strong style="color: #c74037;">EDTECH: </strong>Coming into 2019, what are some particularly important security practices universities will need to adhere to?</h2> <p><strong>Sullivan:</strong> What we're seeing now is more of a move to<a href="https://edtechmagazine.com/higher/article/2018/10/education-department-warns-universities-improve-identity-management"> identity-based security</a>, rather than having a trusted network and giving somebody access to the network, because we found that adversaries abuse access to trusted networks. </p> <p>With the notion of lateral movement, all they have to do is compromise one user that has access to a trusted network and then they are off to the races. If I am an adversary, I can just <strong>live within that trusted network indefinitely</strong>. </p> <p>We just saw on the news that <a href="https://www.bbc.com/news/technology-46401890" target="_blank">a big hotel chain had somebody in their network</a> for <strong>at least four years</strong>. So there needs to be a shift to what's known in the industry as a “zero-trust architecture.” </p> <p>This is where you do away with the notion of a trusted network. Rather than give somebody access to your network, you give them access only to a <strong>sliver of applications that they need</strong> as part of their day-to-day activities.</p> <p>For example, a student maybe only has access to the productivity suite, some internet applications that are relevant to their courses and the sign-up application for the registrar's office, but would not have access to highly sensitive information. </p> <p>So, rather than segmenting the networking lower in the protocol stack, <strong>do away with that trusted network</strong>, use proxies that have a very good understanding of identity and then limit access based on identity.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/pain-points-and-solutions-cloud-security-it-teams-perfcon" target="_blank"><em><strong>MORE FROM EDTECH:</strong> See how IAM is being used to limit cloud security pain points.</em></a></p> <h2><strong style="color: #c74037;">EDTECH: </strong>Why have universities not introduced zero-trust networks before?</h2> <p><strong>Sullivan:</strong> Zero-trust is taking identity access management and going to the next step. IAM to connect to a trusted network has been around for some time, but what I think is more novel is doing away with trusted networks altogether. </p> <p>This means <strong>using identity with more of </strong><strong>a proxy</strong><strong> level access to applications</strong>. So, really, the change is, rather than having a firewall that separates a trusted network and untrusted network, and then once someone is on the network they have opportunities to really do all kinds of nasty things, users would have access to a sliver of applications and that access would be indirect. </p> <p>The network would use a proxy that would <strong>act as sort a traffic cop</strong>, terminating all user requests and then, on the back end, making requests on a user’s behalf only to the applications where their identity would be allowed to go. </p> <p>This cuts down on the potential for human error, as well as some of the complexity of segmenting an entire network. </p> <p><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> <h2><strong style="color: #c74037;">EDTECH: </strong>How would a university get started constructing a zero-trust network?</h2> <p><strong>Sullivan:</strong> I think the first rule would be starting with a good understanding of the identity of users, which the university should have. If universities tie access to identity, you <strong>do away with some of the problems of </strong><strong>a latent</strong><strong> access</strong>, and then you would essentially begin publishing applications in what we call a “zero-trust model.”</p> <p>This means you would give access to the proxy. So, of course, all traffic to a proxy would grant that access. Then, once you've made access available in a new model, you <strong>do away with the old capabilities</strong>. </p> <p>Things like a VPN, which gives you access to a network, a very broad level of access, things like a trusted corporate or university Wi-Fi, those would go away in favor of just providing transport. </p> <p>You would still have a Wi-Fi, but it would basically be like a Starbucks hotspot, meaning it <strong>would not be associated with privilege</strong>. We have seen major companies follow this path. Akamai has adopted this method, Google has gone down that path and so has Netflix. </p> <p>Other controls that we see are for the students themselves. Universities are in a tricky spot because they have to provide internet access as part of the campus experience.</p> <p>Wherever the student is, whether <a href="https://edtechmagazine.com/higher/article/2018/10/colleges-tackle-great-outdoors-campus-wi-fi-upgrades">outside on campus</a> or in their dorm, they want to be able to connect to the Wi-Fi. And as a university, you want to have some level of control over what your users are doing, but typically in an academic university climate you don't want to have a heavy hand. There's not a lot of appetite there on the part of the students for that type of regime. </p> <p>So, we have seen a number of universities <strong>using some lightweight controls</strong>, looking at domain name systems, where universities can look to get an indicator of the type of sites somebody is going to and, if there is a request that IT teams recognize as part of a malware campaign, you can act fast. In fact, leading adopters are very fond of that type of technology because it is such a low-friction touchpoint. </p> <p>That is an<strong> extremely lightweight way to improve security posture</strong> without enforcing a lot of controls on a group that likes to be pretty free. </p> <h2><strong style="color: #c74037;">EDTECH: </strong>Going into 2019, do you expect there to be a positive trend in cybersecurity improvement for education institutions?</h2> <p><strong>Sullivan:</strong> Well, a real change in security effectiveness takes time. So, while the sooner they start the better, I wouldn't anticipate any major changes right away. It seems that now, higher education has been identified by adversaries as a really valuable target, and so <strong>I would expect to continue seeing the trend of high levels of loss in education</strong>.</p> <p>However, I think with security there is a bit of a contrarian indicator. Anytime you have a report card that talks negatively, it will raise awareness. So, I think <strong>there's some benefit to be had immediately</strong> as decision-makers at universities see a poor 2018 cybersecurity report, which could lead to a number of new, ambitious security projects.</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/eli-zimmerman"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/eliheadshot.jpg?itok=dbOQBwFz" width="58" height="58" alt="eli headshot" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/eli-zimmerman"> <div>Eli Zimmerman</div> </a> </div> <div class="author-bio"> <p> <div><p>Eli has been eagerly pursuing a journalistic career since he left the University of Maryland's Philip Merrill School of Journalism. Previously, Eli was a staff reporter for medical trade publication <em>Frontline Medical News,</em> where he experienced the impact of continuous education and evolving teaching methods through the medical lens. When not in the office, Eli is busy scanning the web for the latest podcasts or stepping into the boxing ring for a few rounds.</p> </div> </p> </div> </div> </div> </div> Thu, 10 Jan 2019 16:41:29 +0000 eli.zimmerman_9856 41746 at https://edtechmagazine.com/higher As Colleges Embrace Smart Assistants, Privacy Questions Arise https://edtechmagazine.com/higher/article/2019/01/colleges-embrace-smart-assistants-privacy-questions-arise <span>As Colleges Embrace Smart Assistants, Privacy Questions Arise</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Wed, 01/09/2019 - 13:02</span> <div><p>“Alexa, what’s happening on campus today?”</p> <p>Students across the U.S. can now ask this question to <a href="https://www.chronicle.com/article/Hey-Alexa-Should-We-Bring/244129?cid=wcontentlist_hp_latest" target="_blank">university-issued smart assistants </a>such as <a href="https://www.cdw.com/product/amazon-echo-2nd-generation-smart-speaker/4851509" target="_blank">Amazon Alexa</a> or <a href="https://www.cdw.com/product/google-home-smart-speaker/4393364" target="_blank">Google Home</a>. Some of the earliest colleges to try them out were <a href="https://www.northeastern.edu/" target="_blank">Northeastern University</a>, <a href="https://www.asu.edu/" target="_blank">Arizona State</a> and the <a href="https://www.gsu.edu/" target="_blank">Georgia Institute of Technology</a>. Now, institutions such as <a href="https://www.slu.edu/" target="_blank">Saint Louis University</a>, the <a href="https://www.ou.edu/" target="_blank">University of Oklahoma</a> and <a href="https://www.park.edu/" target="_blank">Park University</a> have them too.</p> <p><a href="https://edtechmagazine.com/higher/media/video/educause-2018-amazons-alexa-moving-dorm-rooms" target="_blank"><em><strong>WATCH: </strong>See how universities are investing in Alexa on campus.</em></a></p> <h2 id="toc_0">Institutions Seek to Increase Both Privacy and Personalization</h2> <p>So far, most of the device deployments serve to <strong>relay public information and perform standard services</strong>. But administrators are hoping that, in the future, student-centered, custom programming will personalize the experience.</p> <p>It’s that personalization, though, that could potentially expose users to security risks. For example, a student may ask, “What’s my grade in this class?” Unless the device can <strong>verify who’s asking the question</strong>, the device could give an answer to just about anybody.</p> <p>Smart assistant privacy issues have <a href="https://www.computerworld.com/article/3276347/mobile-wireless/amazons-echo-privacy-flub-has-big-implications-for-it.html" target="_blank">made national news</a>. Although both Google Home and Amazon Echo have privacy settings so the devices don’t “listen” to random conversations, <a href="https://www.tomsguide.com/us/alexa-google-home-privacy,news-27038.html" target="_blank">experts</a> and <a href="https://consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal" target="_blank">consumer protection groups</a> say the technology can mishear words and “wake up,” <strong>performing actions, storing data and becoming a target for cybercriminals</strong>.</p> <p>In an <a href="https://6abc.com/technology/experts-warn-of-privacy-concerns-around-digital-assistants/3441326/" target="_blank">interview with Philadelphia’s ABC-6</a>, Drexel University Professor Rob D’Ovidio said that, while he didn’t want to demonize the devices, he wanted consumers to be aware of how companies treat their data.</p> <p>“The assumption that we have an expectation of privacy is going to be a bad assumption,” said D’Ovidio in the segment.</p> <p><a href="https://edtechmagazine.com/higher/article/2019/01/3-cybersecurity-threats-higher-education-institutions-should-be-wary-2019" target="_blank"><em><strong>MORE FROM EDTECH: </strong>Check out how to protect your campus as emerging tech becomes more commonplace.</em></a></p> <h2 id="toc_1">Northeastern Smart Assistant Pilot Incorporates Strict Privacy Policy</h2> <p>To help address these concerns, Northeastern is working with startup <a href="https://n-powered.com/" target="_blank">n-Powered</a> to make smart assistants more helpful and prioritize privacy at the same time.</p> <p>In a pilot program, n-Powered created a custom Amazon Echo Dot application called Husky Helper (named after the university’s mascot) to <strong>help students gain access to more personal information</strong>. Then, they had to pool together the university’s data.</p> <p>“If you are a student, you have financial aid information in one system and classes and academic coaches in another system and transcripts in another system,” <a href="https://www.americaninno.com/rhodeisland/rhode-island-startup/this-platform-uses-alexa-to-keep-college-students-informed/" target="_blank">co-founder Somen Saha, the former director of IT at Northeastern University, told the publication Rhode Island Inno</a>. “Something has to connect all of these things to you.”</p> <p>With access to personalized data, <a href="https://edscoop.com/northeastern-amazon-echo-dots-alexa-students/" target="_blank">EdScoop reports</a> that students <strong>can ask Alexa to do something specific</strong>, such as set an alarm before their first class in the morning. They can also ask, “Why is there a hold on my account?” and “How much money is left on my meal plan?”</p> <p>Because Husky Helper was designed with a strict <a href="https://n-powered.com/husky-helper-privacy-policy-for-google-assistants/" target="_blank">privacy policy</a>, it does not collect information or share it with third parties, including Google or Amazon. In addition, <strong>all data in the system is stored with encryption</strong>. Students can even choose to opt out of using Husky Helper altogether, or choose not to share specific information, like financial aid data, according to <a href="https://news.northeastern.edu/2018/06/21/can-alexa-simplify-student-life-northeastern-gave-60-students-amazon-echo-dots-to-find-out/" target="_blank">an article on the Northeastern news site</a>.</p> <p>Applications like Husky Helper could help other university smart assistant programs become more valuable to students in the future, while protecting privacy. Madeleine Estabrook, vice president for student affairs at Northeastern, told <a href="https://edscoop.com/northeastern-amazon-echo-dots-alexa-students/" target="_blank">EdScoo</a>p she has high hopes. </p> <p>“We know that what works is making sure that our students feel they belong,” she said. “The more we can engage them where they are, the better experience they have. That’s exactly what this does.”</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/erika-gimbel"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/erika-gimbel.jpg?itok=COBsR_2x" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/erika-gimbel"> <div>Erika Gimbel</div> </a> </div> <div class="author-bio"> <p> <div><p>Erika Gimbel is a Chicago-based freelance writer who specializes in B2B technology innovation and educational technology.</p> </div> </p> </div> </div> </div> </div> Wed, 09 Jan 2019 18:02:04 +0000 eli.zimmerman_9856 41741 at https://edtechmagazine.com/higher Augusta University Launches State’s First Cybersecurity Engineering Degree Program https://edtechmagazine.com/higher/article/2019/01/augusta-university-launches-states-first-cybersecurity-engineering-degree-program <span>Augusta University Launches State’s First Cybersecurity Engineering Degree Program</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Tue, 01/08/2019 - 09:17</span> <div><p>Within the next 12 months, industry experts predict a major shortfall in cybersecurity professionals, a gap spanning anywhere from <a href="https://www.forbes.com/sites/forbestechcouncil/2018/08/09/the-cybersecurity-talent-gap-is-an-industry-crisis/#192ac802a6b3" target="_blank">1.5 million</a> to <a href="https://image-store.slidesharecdn.com/be4eaf1a-eea6-4b97-b36e-b62dfc8dcbae-original.jpeg" target="_blank">as many as 2 million</a>.</p> <p>In response, institutions such as <a href="https://www.augusta.edu/" target="_blank">Augusta University</a> in Georgia have <strong>created specialized degrees</strong> to narrow the skills gap and provide a workforce ready to handle the growing issue of cybercrime. </p> <p>One of AU’s newest majors, <a href="https://www.augusta.edu/ccs/bs-it-cybersecurity.php" target="_blank">cybersecurity</a><a href="https://www.augusta.edu/ccs/bs-it-cybersecurity.php" target="_blank"> engineering</a>, was recently approved by the university’s board of regents for classes beginning in the fall of 2019. It’s the<strong> first program in Georgia</strong> to approach the subject from both hardware and software perspectives.</p> <p>In an <a href="https://jagwire.augusta.edu/archives/57546" target="_blank">article for Jagwire</a>, AU’s newspaper, Alex Schwarzmann, dean of the School of Computer and Cyber Sciences, explained that the AU degree is unique because most cybersecurity programs focus exclusively on software. The cybersecurity engineering degree will teach students to look at the problem from a broader perspective that includes <strong>hardware, software and the human </strong><strong>elements</strong><strong> of security</strong>.</p> <p>“Focusing solely on software security can give only a false sense of security when it comes to protecting your computer and information systems,” Schwarzmann told Jagwire. “We need rigorous approaches to securing both software and hardware dimensions of systems.”</p> <p>The cybersecurity engineering degree is just one of five IT bachelor’s programs at AU. Two other new degrees — a Bachelor of Science with a major in cyber operations and a Bachelor of Science with a major in cybersecurity — will be added to the existing degrees of computer science and information technology.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/universities-invest-cybersecurity-pathways-add-workforce" target="_blank"><em><strong>MORE FROM EDTECH:</strong> See how universities are helping to grow the skilled cybersecurity workforce.</em></a></p> <h2 id="toc_0">Augusta Sees Growth in City's Cybersecurity Industry</h2> <p>In presenting the new program to the AU board, President Brooks Keel said that Augusta was experiencing a “Cyber Tsunami” as a result of <strong>growth by local businesses and the relocation</strong> of the<a href="https://www.arcyber.army.mil/" target="_blank"> U.S. Army Cyber Command</a> to the city.</p> <p>“We knew as soon as the Army made the decision to move the Cyber Command that something big was going to happen in Augusta,” Keel told <a href="http://www.govtech.com/education/higher-ed/Augusta-University-Creates-Georgias-First-Cybersecurity-Engineering-Degree-Program.html" target="_blank"><em>The Augusta Chronicle</em></a>.</p> <p>Between the Army Cyber headquarters, the growing presence of the <a href="https://www.ajc.com/news/local/the-nsa-augusta-reality-winner-arrest-shines-spotlight-agency-georgia-presence/ng91jZt4OraLKa5cHDG2ZK/" target="_blank">National Security Agency</a> and other companies that are flocking to Augusta, 13,000 new professionals will be moving to the area, <strong>intensifying the demand for qualified workers</strong>.</p> <p>Keel and other leaders at AU intend to work closely with these newcomers to shape their programs and train students with the right skills.</p> <p>“The thing we have to do is be flexible in terms of what we offer to meet what the industry and the workforce needs, but also, in doing that, we want to make sure we give students an option a year or two years or three years down the road,” Keel told the Chronicle.</p> <p>In addition, AU Provost Gretchen Caughman said the university is working with the military to customize training and to offer military professionals credit hours that can be applied to a degree.</p> <p>Students also see the opportunity in computer science: Enrollment has increased in AU’s degree programs by <strong>428 percent</strong> over the past three years. The university expects these numbers to continue to grow rapidly. </p> <p>“The demand for the degrees will continue at least for five years in double-digit percentages per year,” Schwarzmann told the Chronicle.</p> <p><em>For more information on cybersecurity programs in universities across the U.S., visit this list of <a href="https://www.cyberdegrees.org/listings/top-schools/#Best_Cyber_Security" target="_blank">top cybersecurity schools for 2019</a>.</em></p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="https://biztechmagazine.com/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/erika-gimbel"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/erika-gimbel.jpg?itok=COBsR_2x" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/erika-gimbel"> <div>Erika Gimbel</div> </a> </div> <div class="author-bio"> <p> <div><p>Erika Gimbel is a Chicago-based freelance writer who specializes in B2B technology innovation and educational technology.</p> </div> </p> </div> </div> </div> </div> Tue, 08 Jan 2019 14:17:10 +0000 eli.zimmerman_9856 41736 at https://edtechmagazine.com/higher 3 Cybersecurity Threats Higher Education Institutions Should Be Wary of in 2019 https://edtechmagazine.com/higher/article/2019/01/3-cybersecurity-threats-higher-education-institutions-should-be-wary-2019 <span>3 Cybersecurity Threats Higher Education Institutions Should Be Wary of in 2019</span> <span><span lang="" about="/higher/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Mon, 01/07/2019 - 13:22</span> <div><p>2018 was a bad year for higher education cybersecurity after experts revealed education institutions had the <a href="https://edtechmagazine.com/k12/article/2018/12/3-ways-k-12-schools-can-improve-their-cybersecurity-2019">weakest digital protections</a> out of 17 vulnerable industries. </p> <p>Moreover, while universities are falling behind on their security plans, the cyber underworld is <strong>evolving and consolidating</strong>, according to the <a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-2019-threats-predictions/?eid=RM6MCTY1&amp;contactid=255616&amp;smcid=EM" target="_blank">McAfee Labs 2019 Threats Predictions Report</a>.</p> <p>“We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will <strong>need to respond more quickly and effectively than ever before</strong>,” writes Raj Samani, chief scientist and <a href="https://www.cdw.com/content/cdw/en/brand/mcafee.html?enkwrd=McAfee" target="_blank">McAfee</a> fellow for advanced threat research, in an introduction accompanying the report.</p> <p>So, what does 2019 have in store when it comes to cyberthreats? Here are three security concerns universities should turn their attention to quelling in the coming year.</p> <h2 id="toc_0">1. Universities Should Watch Out for AI Threats</h2> <p>Artificial intelligence has <a href="https://edtechmagazine.com/higher/article/2018/08/artificial-intelligence-poised-expand-higher-education">much to offer universities</a> in terms of efficiency and automation of tedious tasks, but cybercriminals see opportunity in the technology as well, particularly when it comes to evasion techniques, which enable the criminals to <strong>avoid detection and circumvent security</strong>.</p> <p>“We expect evasion techniques to begin leveraging artificial intelligence to automate target selection, or to check infected environments before deploying later stages and avoiding detection,” explain McAfee researchers in the 2019 Threat Predictions Report.</p> <p>This AI-based malware will stack up on top of the already <strong>plentiful list of evasion techniques</strong> the cyber underground employs today, including new techniques spotted in 2018, such as botnets and <a href="https://edtechmagazine.com/higher/article/2018/06/cryptocurrencies-make-their-way-campus-bringing-flexibility-and-risks">cryptomining</a>.</p> <p>A possible antidote is <strong>AI-based and other next-generation cybersecurity tools</strong>, which are making use of emerging technology in order to detect and ward off increasingly sophisticated threats.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/12/colleges-turn-ai-cybersecurity-defense" target="_blank"><em><strong>MORE FROM EDTECH:</strong> See how universities are using artificial intelligence on campus to protect their networks.</em></a></p> <h2 id="toc_1">2. Cloud Security Is Essential as Campus Migrations Continue</h2> <p>As the adoption of <a href="https://edtechmagazine.com/higher/article/2018/08/key-considerations-your-next-high-ed-cloud-storage-solution">cloud-based email and other applications takes off</a>, cloud security will become an even larger concern in the new year, particularly because, according to McAfee,<strong> 21 percent of data stored</strong> in the cloud is sensitive. Bad actors search out, in particular, when cloud or credentials have been misconfigured.</p> <p>“As workload migration accelerates to the public cloud, security risk professionals will need to get <strong>more actively involved in their DevOps team’s processes</strong>, so they can automate the application of governance and compliance controls,” explains Tim Jefferson, vice president of Public Cloud at Barracuda Networks. “It’s not about dictating what tools the team uses, but verifying that controls are being met and helping the builders build securely.” </p> <p>Jefferson expects, as a result, to see more teams embracing automation that can help to “continuously monitor cloud security and remediate problems automatically.” </p> <p><a href="https://edtechmagazine.com/higher/article/2018/09/pain-points-and-solutions-cloud-security-it-teams-perfcon" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how universities can avoid cloud security pain points. </em></a></p> <h2 id="toc_2">3. Be Sensitive of Voice-Controlled Digital Assistants</h2> <p>Voice-controlled digital assistants are entering <a href="https://edtechmagazine.com/higher/media/video/educause-2018-amazons-alexa-moving-dorm-rooms">campus dorms and classrooms</a>, revolutionizing how teachers and students interact. But, as with any new technology, they also represent a new threat vector.</p> <p>“This opportunity to control a home’s or office’s devices will not go unnoticed by cybercriminals, who will engage in an altogether different type of writing in relation to the market winner, in the form of malicious code designed to attack not only IoT devices but also <strong>the digital assistants that are given so much license to talk to them</strong>,” McAfee researchers note in the report. </p> <p>This ability to monitor and control infected Internet of Things devices, such as digital assistants, smartphones and routers, could literally invite bad actors in.</p> <p>“Infected IoT devices will supply botnets, which can launch DDoS attacks, as well as <strong>steal personal data</strong>,” the McAfee researchers note. “The more sophisticated IoT malware will exploit voice-controlled digital assistants to hide its suspicious activities from users and home-network security software. Malicious activities such as opening doors and connecting to control servers could be triggered by user voice commands (“Play music” and “What is today’s weather?”). Soon we may hear infected IoT devices themselves exclaiming: “Assistant! Open the back door!””</p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/juliet-van-wagenen"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Headshot%20JV.JPG.jpg?itok=8ak2COBM" width="58" height="58" alt="Juliet Van Wagenen" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/juliet-van-wagenen"> <div>Juliet Van Wagenen</div> </a> </div> <div class="author-bio"> <p> <div><p>Juliet is the senior web editor for <em>StateTech</em> and <em>HealthTech</em> magazines. In her six years as a journalist she has covered everything from aerospace to indie music reviews — but she is unfailingly partial to covering technology.</p> </div> </p> </div> </div> </div> </div> Mon, 07 Jan 2019 18:22:27 +0000 eli.zimmerman_9856 41731 at https://edtechmagazine.com/higher Privacy Emerges as a Top Concern for Higher Education IT https://edtechmagazine.com/higher/article/2019/01/privacy-emerges-top-concern-higher-education-it <span>Privacy Emerges as a Top Concern for Higher Education IT</span> <span><span lang="" about="/higher/dashboard/elizimmerman9856" typeof="schema:Person" property="schema:name" datatype="">eli.zimmerman_9856</span></span> <span>Fri, 01/04/2019 - 08:47</span> <div><p>When <a href="https://edtechmagazine.com/higher/article/2018/11/educause-2018-top-10-it-issues-emphasize-data-and-funding-challenges" target="_blank">EDUCAUSE released its 2019 Top 10 IT Issues</a>, privacy made the list for the first time, debuting at No. 3. Although student privacy has always been a big concern in K–12 education, many IT professionals in higher education have <strong>primarily focused on the cybersecurity aspect</strong> of data — but that’s changing. </p> <p>As colleges increase their use of data to develop student interventions and deliver personalized services, they have a growing responsibility to develop guidelines and best practices to protect students’ personal information. </p> <p>The Top 10 IT list, developed by EDUCAUSE community members, defines the privacy imperative as “<strong>safeguarding institutional constituents’ privacy rights</strong> and maintaining accountability for protecting all types of restricted data.” </p> <p>There’s no doubt the collection of data as a valuable asset has become commonplace in higher education: <a href="https://www.naspa.org/images/uploads/main/DATA2018_DOWNLOAD.pdf" target="_blank">According to one study</a>, <strong>42 percent </strong>of institutions collect and integrate data from student information systems, for example, and another <strong>31 percent </strong>actively use that data to inform student success initiatives. </p> <p>Most data projects, in fact, <a href="https://edtechmagazine.com/higher/article/2018/04/Colleges-Tap-Data-Driven-Insights-to-Boost-Students%E2%80%99-Performance">focus on student success and academic progress</a>. They track students’ progress through recruitment, admissions and enrollment; degree completion; and postgraduation outcomes, among other measures, the study found. And it’s important to note the vast majority of leaders in this study say they do <strong>respect privacy rights when conducting student success studies</strong>. That’s a good sign, but the issues are about to become much more complex, so administrators will need to be diligent to keep up.</p> <p><a href="https://edtechmagazine.com/higher/article/2018/04/higher-ed-security-pros-get-strategic-neutralize-threats" target="_blank"><em><strong>MORE FROM EDTECH: </strong>See how higher education IT leaders are approaching new-age cybersecurity threats.</em></a></p> <h2 id="toc_0">The Internet of Things Complicates the Data Privacy Landscape</h2> <p><a href="https://www.educause.edu/guides/understanding-data-privacy-issues-in-higher-education" target="_blank">As EDUCAUSE notes</a>, privacy issues can be complex and nuanced. First, there are two types of privacy to worry about: <strong>autonomy privacy</strong>, or individuals’ right to go about their business without unwarranted oversight by an institution; and <strong>information privacy</strong>, or individuals’ right to have some say in how an organization uses their personal data. </p> <p>Second, <a href="https://www.wisc.edu/" target="_blank">University of Wisconsin</a> researcher and professor <a href="https://campustechnology.com/Articles/2018/05/02/When-Learning-Analytics-Violate-Student-Privacy.aspx?Page=2" target="_blank">Alan Rubel noted</a> the <a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" target="_blank">Family Educational Rights and Privacy Act</a>, which governs much of the information that institutions traditionally collected, may not cover or clarify all of the data types that are now in play. </p> <p>Third, the Internet of Things is allowing institutions to <strong>collect an ever-increasing amount of data</strong>, much of it unprecedented. Colleges could, for instance, track students’ movements around campus — to the library, say, or the recreation center — using <a href="https://edtechmagazine.com/higher/article/2018/12/how-can-beacon-technology-help-universities-boost-student-engagement-perfcon">beacons</a>, smartphones, wearables, and<a href="https://edtechmagazine.com/higher/article/2018/12/near-field-communication-technology-supports-contactless-student-id-universities-perfcon"> ID cards linked to iPhones and Apple Watches</a>. </p> <p>Their intention in collecting such data may be noble; what if they could use this information to help students identify behavior patterns and draw connections with their academic performance? But the slope is slippery, and the territory uncharted.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="https://biztechmagazine.com/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> <h2 id="toc_1">Educators Advocate for a Broad Conversation About Data Privacy</h2> <p>That’s one reason EDUCAUSE members <a href="https://er.educause.edu/articles/2018/5/setting-the-table-responsible-use-of-student-data-in-higher-education" target="_blank">Martin Kurzweil and Mitchell Stevens</a> advocate for higher education institutions to “invite others to help us <strong>define ethical practice and responsible use of student data</strong> in the rapidly changing digital world of the academic enterprise.” They note that among learning management systems, <a href="https://edtechmagazine.com/higher/article/2018/11/qa-tom-livne-how-ai-enabled-tools-can-help-boost-accessibility-campus">artificial intelligence–powered assistants</a> and <a href="https://edtechmagazine.com/higher/article/2018/05/4-ways-make-distance-learning-programs-stand-out">distance-learning solutions</a> that facilitate remote interactions, our higher education campuses are filled with “digital traces.” </p> <p>To help educators and institutions protect students’ data, and to generate a broad conversation about privacy and responsible data use, Kurzweil and Stevens developed the <a href="http://gsd.su.domains/" target="_blank">Responsible Use of Student Data in Higher Education</a> project. </p> <p>Although some surveys suggest that students are comfortable with the use of their data, as long as the applications are transparent and for their benefit, <strong>institutions should solicit students’ input</strong> into data initiatives. </p> <p>That’s what the <a href="https://www.berkeley.edu/" target="_blank">University of California, Berkeley</a> did when it realized that some student information was housed in vendor systems that weren’t under its control. One best practice that UC Berkeley identified was to negotiate vendor agreements to include opt-in choices for students.</p> <p>In a panel discussion about EDUCAUSE’s Top 10 IT list at the annual conference in October, Carlos Morales, the president of <a href="https://www.tccd.edu/" target="_blank">Tarrant County College</a>’s Connect campus, noted that campus staff may be unclear about the boundaries between privacy and confidentiality. </p> <p>Leaders should consider campuswide training to ensure that staff, faculty and even students <strong>understand these parameters and how to uphold them</strong>. IT staff should also work closely with other departments to help build privacy protections into any data-driven initiatives.</p> <p>By continuing to have open conversations and by working to develop (and share) best practices, colleges will position themselves to take advantage of the advances data analytics make possible, while still upholding the highest privacy standards.</p> <p><em>This article is part of EdTech: Focus on Higher Education’s UniversITy blog series.</em></p> <p><a href="http://www.edtechmagazine.com/higher/university" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="https://edtechmagazine.com/higher/sites/default/files/university-400.jpg" /></a></p> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/higher/author/nicci-fagan"><img src="/higher/sites/edtechmagazine.com.higher/files/styles/face_small/public/people/Nicci.jpg?itok=xnL9k1ke" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/higher/author/nicci-fagan"> <div>Nicci Fagan</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=nffagan&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Nicci is the director of Central and Eastern U.S. higher education sales for CDW•G.</p> </div> </p> </div> </div> </div> </div> Fri, 04 Jan 2019 13:47:20 +0000 eli.zimmerman_9856 41726 at https://edtechmagazine.com/higher