Challenging Our Education System to Nurture the Cyber Pipeline

Dark Reading

Let's teach students how to teach themselves. Once we do that, we will have taught a generation of students how to think like hackers

Improving Healthcare Security Education

Data Breach Today

Wombat's Gretel Egan on How to Take a Fresh Approach to the Awareness Challenge As attackers increasingly take advantage of users' risky behavior, enterprise security leaders are taking steps to improve end-user security education. Gretel Egan of Wombat Security outlines how to focus on education strategies that are truly effective

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Implement Microsegmentation

eSecurity Planet

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Approaches to microsegmentation. Approach gradually, with attention to process.

How to Increase Your Security Posture with Fewer Resources

Threatpost

Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.

Protecting Sensitive Company Data: How to Educate Employees

AIIM

The threat of a hack is greater than it ever has been before with technology now reaching all parts of the world and granting access to the internet uniformly. With the problem growing, and the attacks getting more sophisticated, there has never been a better time to learn how to defend your business’s data and protect your employees. In this article, we will examine how to educate your employees so that a lethal hack does not disrupt your business.

Ferpa Compliance In Education: How to Securely Manage Student Records

Record Nations

The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. Part 99) is a federal law that protects the privacy of student records by prohibiting schools from disclosing the personally identifiable information in student education records. FERPA was enacted in 1974 and applies to all schools that receive funds from an […]. The post Ferpa Compliance In Education: How to Securely Manage Student Records appeared first on Record Nations.

How to Educate Your Customers When A Data Breach Occurs

Rippleshot

Not to mention, the scope is widening as droves of sensitive data is filling the dark web for fraudsters to monetize for their next big fraud scheme. We're here to help you protect your own customers. That's why we're also here: To help you educate your customers and members when the next big data breach happens — and what to do about it. Below are our tips to bookmark to remind yourself what steps you should take when that next data breach occurs.

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are being used to radicalize youth. The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime. Here are some tips to excite kids about cybersecurity. Who do they like to communicate with onlin.

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The number of sensors and smart devices connected to the internet is exponentially rising, which are the 5 Major Vulnerabilities for IoT devices. IoT devices are exposed to cybersecurity vulnerabilities. A hacker managed to identify a weak spot in a security camera model.

IoT 105

How to get more out of your education technology

Jamf

To help district leaders, IT, instructional technologists and teachers get the most out of their education technology initiatives, we put together several resources explaining best practices for deploying, securing and managing iPad

How To Keep Cybersecure Over the Holidays

Adam Levin

The number of people willing to use their personal devices for holiday shopping has also increased as a result of the pandemic. It’s a good idea to prepare for cybercrime, and whenever possible avoid becoming a victim of it. Also pay attention to detail.

Guest Post: How to Use Gamification to Make Learning More Engaging

IG Guru

Photo by Uriel Soberanes on Unsplash December 2nd, 2020 by Daniela McVicker Every parent wants to raise successful kids. The chances are that you, as a parent, ask yourself a question, “What can I do to set my children up for success?”

How to facilitate remote learning: Part 1 — Setting expectations

Jamf on EdTech

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, virtual learning experience.

How to build a business glossary

Collibra

The real benefit of a business glossary is that it can provide all the context around an asset so any user can understand what the asset is, who owns it, and how it has changed over time. The best way to address this challenge is to start small.

How to implement data governance

Collibra

You’ve evaluated and demoed countless technologies and you think you’re ready to select a solution. This article is meant to outline the vital steps for implementing data governance. At Collibra, we recommend a 10-step approach to data governance.

How to facilitate remote learning: Part 2 — Engaging discussions

Jamf on EdTech

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience.

Government surveying further education providers before Brexit

IT Governance

The ICO (Information Commissioner’s Office) , which oversees data protection rules in the country, and gov.uk , regularly provide guidance to help organisations make sense of their requirements. They often speak to organisations before creating guides to understand exactly what issues people are struggling with. Colleges and apprenticeship providers have until Friday, 27 September to complete the quick questionnaire.

3 Educational Resources For Financial Institution Fraud Managers

Rippleshot

We know it's hard to find a one-stop resource shop for determining how to choose the right fraud tools that align with your fraud strategies and organization goals. The Rippleshot team is here to be your guide to approach this complex space. Fraud managers are busy.

How to Manage Your Child’s Paperwork During Online School

Record Nations

While as the name implies with online school the majority of things are handled digitally, just like any other industry paper still is and probably always will be used with education. The post How to Manage Your Child’s Paperwork During Online School appeared first on Record Nations.

Paper 52

Fixing Data Breaches Part 1: Education

Troy Hunt

Last month, I went to Washington DC, sat in front of Congress and told them about the problem. That was really our mandate - understanding the impact on how we verify ourselves - but I want to go back a step and focus on how we tackle data breaches themselves. Before I left DC, I promised the folks there that I'd come back with recommendations on how we can address the root causes of data breaches. Data Breaches Occur Due to Human Error.

Sign up for the new education sector email updates

IT Governance

To support the wider education sector with data protection and cyber security, we are launching a sector specific email newsletter and blog series. How to sign up. To sign-up, send us ideas of what you would like us to cover or questions for us to answer, please leave complete this form and choose education as your sector. More about our education sector products and services.

How to foster a culture that values data privacy

Collibra

Similarly, Lockheed Martin indicates data protection and cybersecurity as focal points in its strategy to improve operational efficiency and gain competitive advantage. They put data at the forefront of their strategies to get ahead of competitors. Nevertheless, nothing seems to stick.

How to build a data culture

Collibra

However, many organizations are struggling to evolve their workforces at the same pace as the evolving datasphere. In order to achieve Data Intelligence, businesses need to forge a data culture and empower their workforce with data governance. How do you create a data culture.

How to facilitate remote learning: Part 5 — Apps and games

Jamf on EdTech

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In the conclusion of our five-part blog series, we show you how to leverage apps and games to enhance remote learning

Education technology tips for this school year

Jamf

What are the five most common education technology mistakes schools make? We explain and show you how to avoid a similar fate

How to help teachers succeed with iPad

Jamf

Here are three tips to ensure teachers are maximizing your education technology initiative

How to Take Your Business to The Next Level with Data Intelligence

erwin

Data Intelligence is the analysis of multifaceted data to be used by companies to improve products and services offered and better support investments and business strategies in place. It also differs from business intelligence since its goal is to augment future endeavors and plans.

The importance of computer identity in network communications: how to protect it and prevent its theft

Security Affairs

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing on online communications. Hash encryption is used to ensure integrity and authentication.

How to facilitate remote learning: Part 4 — Active learning

Jamf on EdTech

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part four of our five-part blog series, we show you ways to offer active learning through projects and breakout groups

How to Keep Your Information Safe for Data Privacy Day 2020

Thales Cloud Protection & Licensing

An extension of the celebration for Data Protection Day in Europe, Data Privacy Day functions as the signature event of the National Cyber Security Centre’s ongoing education and awareness efforts surrounding online privacy. Its aim is to foster dialogue around the importance of privacy.

How to facilitate remote learning: Part 3 — Peer-to-peer interaction

Jamf on EdTech

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part three of our five-part blog series, we show you ways to promote peer-to-peer interaction

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

For me, this brings up the question of how to solve the cybersecurity skills shortage. This creativity works only if you are willing to put the effort into applying the solution that this problem requires. Stop treating this profession as a profitable mass education opportunity like just any other profession. In science, I learned that if you apply a framework to an object to change a content, and if it fails, then change the framework, not the object.

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders. In response to requests, below are some excerpts from my transcribed remarks.

How to Preserve Your Old Documents While Growing Digitally

AIIM

On one hand, you need to keep them stored away so that they don’t obstruct your daily work and clutter up the workspace. On the other, however, when you do need the documents, you need to be able to locate them quickly and not waste hours trying to figure out where they might have ended up. And today, when many of the newer documents are already stored digitally, how can you still find a reliable way to handle old paper records that are still relevant to your business?

Paper 70

How to Help Teams through the Cycle of Change

AIIM

It is common to take great care in the selection and implementation of new technology. If people resist change, find ways to sabotage your efforts or become angry or withdrawn, it is unlikely that even the best technology strategies will have meaningful success. Resistance to change is often a more troubling problem than even the most complicated tangle of technology. One way to start is by understanding the Cycle of Change. Resistance to Change is Natural.

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

state to pass its own data privacy law. 1, 2020, grants to the state’s over 40 million people a range of rights comparable to the rights given to European citizens with the General Data Protection Regulation (GDPR)–the two legislations are not that similar, but they do share some general features, GDPR is an omnibus law, while CCPA is more limited. A key variation with GDPR is the word “household” which adds more complexity to the implementation of the Act.

Quick Tips on How to Sell Your Data Science Model

Perficient Data & Analytics

During a five-week IBM training program, I learned a few things about how to sell data science models that I’d like to share it with you. The program was explicitly designed to educate and familiarize IBM’s business partners on how to expand relationships with clients; an introduction to emerging tools; and a glimpse into IBM’s future so that business partners strategically leverage clients in the competitive AI movement.

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. Yet staff awareness and education are key components of any organisation’s GDPR compliance framework. . one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . Engaging staff training is critical to your programme’s success.

GDPR 49

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. Yet staff awareness and education are key components of any organisation’s GDPR compliance framework. . one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . Engaging staff training is critical to your programme’s success.

GDPR 49

How to Better Secure Your Data in 2019

OneHub

With 2019 upon us, many businesses are beginning to consider their data security practices for the new year. Whether your company operates primarily in the online space, or simply uses a secure cloud storage platform to manage and share your business files, data security is incredibly important. Safer systems mean your customer’s data is less likely to be compromised and your clients and business partners can feel more confident trusting you with their sensitive information.