Skip to main content

oladhealthy The Formula Of Campus Network Security

Education Cybersecurity Weekly is a curated weekly news overview for those who are concerned about the Education industry. It provides brief summaries and links to articles and news across a spectrum of cybersecurity and technology topics that are specific to the industry.
If hackers played darts in the office, the dartboard on the inside of the door would be called “universities’ data”.While new GDPR rules strictly fine organizations if they do not take adequate steps to secure their systems, IT departments are trying to build an effective security policy for their institutions.

The analytics-driven security platforms to fight against cyber threats on campuses

EdScoop on January 21, 2019
If hackers played darts in the office, the dartboard on the inside of the door would be called “universities’ data”.
Storing tremendous amount of personal data and annually connecting thousands of new devices, the campus network system is a matter of IT team’s concern. However, according to a recent research, the analytics-driven security platforms may become a solution in reducing exposure to cyber threats. The platform of this type, monitoring and analyzing data from several sources, can improve following cybersecurity measures:
  1. Collection of basic security logs and other machine data of the organization
  2. Applying a standard security taxonomy for asset and identity data
  3. Advanced attack detection through collecting additional sources like endpoint activity and network metadata
  4. Updating the security data by augmenting it with intelligence sources
  5. Establishing consistent capabilities via automation of the security operations

And something more on campus network security – how to mitigate IoT risk

EdTech Magazine on January 15, 2019
30 billion is a number of the autonomous IoT devices that are expected to be on the University of Kansas network in two short years.
While the phrase “IoT risks” sounds like a commonplace and insistently appears in your news feed, security experts discuss the question of how we use the data coming from IoT to make decisions properly.
To solve this problem, IT administrators of the Montana State University implemented the intent-based networking to better understand the students’ intentions on the network and to precisely determine an access request that seems out of place.
Another tip for IT teams to minimize IoT cyber threats is to be the ones to install the IoT devices across the campus. The experience of the Virginia Commonwealth University showed the effectiveness of this measure in strengthening the campus network security.

Network minus cyber threats equals to e-safety

Education Technology on January 20, 2019
In the last year every third of the educational institutions in the UK fell victim to some form of cybercrime. More than one in ten schools had their passwords cracked by an outside attackers or suffered a successful social engineering attack. While new GDPR rules strictly fine organizations if they do not take adequate steps to secure their systems, IT departments are trying to build an effective security policy for their institutions. Thus, these tips would be useful:
  • Establish solid access control policies and constantly update content filters to reduce the risk of deliberate attacks and accidental breaches. Some tech-savvy students are able to overcome all protection mechanisms.
  • Check third-party providers thoroughly and ensure their approach to cybersecurity is matching the law requirements.
  • Ensure secure configuration and patch management – the security patches should be implemented timely and all configuration changes need to be authorized.
  • Monitoring and incident management – schools’ systems must be continuously monitored and in case of the criminal incidents the relevant authorities must be aware.
  • Invest in cybersecurity and online safety education – the UK Department for Education requires that students are taught about online safety as part of safeguarding activities.
  • Don’t forget physical security and consider personal devices.

Students are challenged to construct a drone to save endangered animals

Education Technology on January 22, 2019
This is the way how it should be. The Youth Innovation competition initiated by the British International Education Association (BIEA) focuses on fighting extinction and illustrates a role technology should play in the education process.
The initiative challenges 9-17 aged children to design and develop a drone to protect vulnerable animal species. What is noteworthy, the competition emphasizes the ethical implication of technology, referring not only to humans, but to the animal welfare.
The ethical issue of the technology development is especially actual, in terms of the recent Gatwick incident, where drones flew near the runway and triggered a full shutdown of the airport.
Yes, there are negative things happening with drones, and I want the kids to find out about them. The competition stipulates that you need to look at both the disadvantages and the advantages, and convince the judges that your idea is an

Comments

Popular posts from this blog

Health Care and Baby Formula

Infants require regular feeding, and common knowledge in pediatric medicine confirms the importance of breast feeding newborns and babies until they are weaned from their mother’s milk. However, in some cases, babies are unable to be nursed. In those situations, baby formula is a good substitute to help with growth, nutrition, and oral stimulation. Baby formula has been around as a substitute food for infants for decades. Since the development of the first commercial infant formula more than 135 years ago, each decade has brought new advancements and the constant refinement of infant formula products’ nutrient composition to ensure that non-breastfed infants receive the essential nutrients needed to thrive. Today’s baby formulas contain energy-providing nutrients (protein, carbohydrates, and fat as well as water), which provide the calories necessary to maintain bodily functions, support activity, and promote growth, according to this website: http://www.infantformula.org/news-room/pre...

Health Care and Choking

Choking is the mechanical obstruction of the flow of air from the environment into the lungs. Choking prevents breathing, and can be partial or complete, with partial choking allowing some, although inadequate, flow of air into the lungs. Prolonged or complete choking results in asphyxia which leads to anoxia and is potentially fatal. Oxygen stored in the blood and lungs keep the victim alive for several minutes after breathing is stopped completely; but unless the choking issue has been resolved and life saving measures have been implemented in time, you could die. According to the Harvard Medical School Family Health Guide, a person who is choking will instinctively grab at the throat. The person also may panic, gasp for breath, turn blue, or be unconscious. If the person can cough or speak, he or she is getting air. Nothing should be done. If the person cannot cough or speak, begin the Heimlich maneuver immediately to dislodge the object blocking the windpipe. The Heimlich mane...

Health Care and ElderCare

Are you one of those adults who is now responsible for taking care of older adults?   Are you responsible for overseeing parents or older family members who now look to you for care? Or, are you someone who is in the business of elder care, and that is either your profession as a caretaker or business owner? Regardless of your status, if you are dealing with issues related to helping seniors or older adults and their health care and lifestyle, then you may need some additional advice along the way.   According to LifeHealthPro, elder care planning is essentially a comprehensive strategy that helps define a senior’s wishes and assists designated caregivers and/or advocates in handling the physical, personal and financial affairs of a senior aging into the last phases of life. Long-term care (LTC) is just one, very important segment of total elder care planning. Unfortunately, LTC as well as other elder care issues are topics of discussion often avoided or delayed by families. B...