Tag Archive for: Ways

3 ways to enable cyber resilience in education in 2023 and beyond


Those of us with the privilege to work in education have an opportunity to shape the next generation to be more cyberaware and make our digital world a safer place. It’s an obligation we must all take seriously.

The threat environment is becoming more perilous, particularly with the growing use of artificial intelligence by hackers. The challenges coming our way in the future will best be met by a population that is informed, aware, and innately invested in cyber safety.

At the same time, cyber leaders at educational institutions today must deal with adversaries who increasingly view us as prime targets. Since institutions of higher education provide students, teachers, and researchers with full, unobstructed access to the resources they need, we’re vulnerable to all types of attacks. The challenge is exacerbated by the fact that our high-speed networks and powerful workstations provide fertile soil for botnets to spread harm broadly and quickly.

When cyber leaders in education view our most pressing challenges, it should be with the understanding that we’re not just practitioners–although that is of vital importance–but also teachers and role models. We need to practice what we preach, and we also need to preach what we practice.

As I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity:

  • Focusing on cyber wellness
  • Adopting a shared responsibility model
  • Embracing secure software development

Here’s why I think these three areas of focus are key to enabling cyber resilience in education in 2023 and beyond.

1. Cyber wellness

Cyber wellness comes down to common sense. It’s a mindset. But people need to be informed. They must understand that cyber safety is always a top priority, and you never let down your guard, not even for a moment. For example, say a student receives an email from a teacher or faculty. Do they know to check that the email address is legitimate? That the request makes sense? That it comes from the actual person making the request? This may seem simple, but it’s quickly becoming more difficult in the era of…

Source…

16 Ways to Protect Yourself from Cyberattacks—and Avoid Getting Hacked


Source…

Civic hackers explore ways to streamline government operations



Lawmakers and technologists united for a day of civic hacking on Capitol Hill as part of an effort to modernize government services and make government operations more efficient.

Source…

All The Ways Blockchain Technology Can Reinvent Online Security


Blockchain is widely regarded as a powerful tool for financial, legal, and a wide range of other business applications. But what about security? Is it possible that the same technology that can be used to protect transactions on an open digital ledger can also protect data and infrastructure?

It turns out that it can. And what’s more, it can reimagine the entire security regimen that has evolved over the past decade, quite probably making the complex and expensive security ecosystems at most enterprises – from firewalls and monitoring platforms to anti-virus and malware solutions – obsolete.

A New Paradigm

The first thing to understand about blockchain is that it operates on a completely different footing than the existing security paradigm – one that is “less traveled and not nearly as hospitable to cyber criminals,” in the words of Infosys’ Yogesh Shelke. Despite more than $1 trillion in spending on traditional security measures over the past five years alone, hackers are still exploiting known and unknown vulnerabilities to gain access to private data and systems – primarily by intercepting device, application, and network communications.

Blockchain reduces these vulnerabilities in a number of ways:

The very nature of its architecture removes the centralized storage paradigm that is the target of most hacking attempts. Now, instead of having to break into just one hardened storage center, the bad guys need to enter thousands simultaneously, or else the alarm bells go off.

Since any member can view the ledger, whether it is a public or private chain, blockchain encrypts its data using the most advanced technologies available. This enables enterprises to secure communications, authenticate devices, validate configuration changes, and discover confidential devices in an Internet of Things (IoT) ecosystem.

Sophisticated algorithms continuously monitor the chain for suspicious actions, anomalies, and false positives without the need for a central authority. This allows all copies of the chain to keep an eye on the others so that even if one is compromised, the others will quickly identify and isolate the trouble spot.

  • Unique Domain Name System (DNS)

Blockchain…

Source…