Tip |
---|
This page provides resources for hot topics related to security, privacy, identity, and compliance in the higher education community. Most of these topics Most of the resources on this page are developed by volunteers from the higher ed community and started as questions posed to the EDUCAUSE Security Discussion Group listserv. If you'd like to see resources gathered for a specific topic, please contact the Higher Education Information Security Council (HEISC).list. Visit the Toolkits page if you can't find what you're looking for here. |
- CISO Model for Higher Education: Information Security Leadership Report
- Cloud
- Higher Education Cloud Vendor Assessment Tool - including a "lightweight" version New!
- Cloud Computing Security: Security Considerations for Cloud Computing
- Cloud Data Storage Solutions: Dropbox Security & Privacy Considerations
- Community Based Security Awareness: Regional and National Security Awareness and Education Efforts
- Copier and MFD Security: Eight Steps to Secure Your Copier or Multi-Function Device (MFD)
- Cyber Liability Insurance: Frequently Asked Questions
- Full Disk Encryption: Introduction to Full Disk Encryption (FDE)GRC FAQ: Frequently Asked Questions about Governance, Risk, and Compliance (GRC) SystemsMac Software Updates: Checking for Software Updates on Your Mac
- Managing Malware: Recommendations for Managing Malware
- Mobile Internet Device Security : Ten Steps to Secure Your Mobile Device
- Social Networking Security: Tips for Safe and Secure Social Networking
- Guidelines: Considerations for Developing BYOD Security Policies, Standards, Guidelines or Procedures
- NIST 800-171
- Password Managers: Tools to Consider for Encrypting, Storing, and Managing Passwords
- PhishingStatewide Longitudinal Data Systems: Statewide Longitudinal Data Systems (SLDS) Security and Privacy Considerations
- Security Tips for Traveling Abroad: Institutional and Governmental Resources About Travel Safety
- Ransomware (external resources): FBI resources; Stop. Think. Connect. tip sheet; SANS OUCH! newsletter
- Two-Factor Authentication: Considerations for Two-Factor or Multi-Factor Authentication
...
Questions or comments? Contact us.
...