A Focus on People: Wireless, Mobile Device Management, and More
The University’s Cyber-security Program has a strong focus on technical safeguards – tools and techniques – to reduce the likelihood of a data breach by selecting, purchasing, and implementing...
View ArticlePhishing, Pharming Vishing, and Smishing: What Are They?
Last week you may have read an article detailing phishing. As we become more educated about phishing, a criminal activity in use since 1987, that attempts to fraudulently obtain sensitive...
View ArticleBusiness Engagement with Higher Education is Critical for Meeting...
The demand for cybersecurity professionals has grown more than 3.5 times faster than the demand for other information technology (IT) jobs and about 12 times faster than the demand for all other jobs...
View ArticleSpring Cleaning Storage Devices and the Cloud
With the spring weather some of you may be thinking it’s time to start the spring cleaning process. Some of you will go through your homes with a vengeance getting rid of unnecessary things. Some may...
View Article