Bringing Cybersecurity to the Forefront
By Jeremy Epstein - EvoLLLution. Postsecondary cyber security in the modern era requires specialist attention; it cannot be a side project. More...
By Jeremy Epstein - EvoLLLution. Postsecondary cyber security in the modern era requires specialist attention; it cannot be a side project. More...
By Clay Wilson - EvoLLLution. It’s critical that universities operate with the same attention to cybersecurity as other banking institutions to protect student financial information. More...
By Novadean Watson-Stone - EvoLLLution. Higher education leaders need to prioritize information security to ensure they can provide students the online service they increasingly expect in a secure system. More...
By Ken Udas - EvoLLLution. In the first instalment of this series, we suggested that the attitudes of many learners in many colleges and universities have shifted from those of a traditional student to those of a student-customer. This is particularly evident when students are engaged in receiving university services. This part of the relationship between the university and the student has become transactional in nature and has been increasingly characterised by—and measured as—a commercial exchange of value. More...
By Quinn Shamblin - EvoLLLution. Institutions want to create the easy-to-use, technology-enhanced higher education environment today’s students and faculty both expect, but it’s critical to have security concerns in mind. More...
By Tim Wiseman - EvoLLLution. Developing distinct risk management frameworks is central to minimizing silos, improving communication and collaboration, and improving institutional efficiency. More...
By Tracy Mitrano - EvoLLLution. College and university leaders need to ensure they are well aware of state compliance and security regulations, and must find a vendor that uniquely understands the higher education environment to facilitate their shift to the cloud. More...
By Jane LeClair - EvoLLLution. Strong policies, a commitment to ongoing training of all key stakeholders and up-to-date technology are all central elements of protecting critical student information from data breaches. More...