+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘Education’

How Does Encryption Work?

June 12th, 2017

Before we get started, I want to call out something very specific. We are going to cover encryption today, and not salting or hashing.  These are two different things that are often associated together when storing things like passwords in a secure manner.  A Quick Overview of Encryption Encryption at its core basis is a…

An Introduction to Business Networks 101

June 2nd, 2017

The intent of this post is an introduction for people who are either exploring getting into some sort of network administration, either for your personal education (such as a college degree) or maybe you’re looking to make a career change.  When it comes to understanding more complex aspects, such as cyber security, sometimes it’s best…

FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…

A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…

Universities under Attack—Securing student, faculty, and staff’s personal information

February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of…