{"id":7683,"date":"2014-10-28T10:00:17","date_gmt":"2014-10-28T14:00:17","guid":{"rendered":"http:\/\/sourcelive.wordpress.com\/?p=7683"},"modified":"2014-10-28T10:00:17","modified_gmt":"2014-10-28T14:00:17","slug":"msu-community-called-to-protect-personal-and-university-information-as-part-of-national-cyber-security-awareness-month","status":"publish","type":"post","link":"https:\/\/sourcelive.hr.msu.edu\/?p=7683","title":{"rendered":"MSU Community Called to Protect Personal and University Information as Part of National Cyber Security Awareness Month"},"content":{"rendered":"<p>While large corporations such as Home Depot, Target and JP Morgan grab the biggest headlines in terms of security issues, no organizations, including higher education institutions, are immune from threats.<a href=\"https:\/\/i0.wp.com\/sourcelive.hr.msu.edu\/wp-content\/uploads\/2014\/10\/ncsam-square.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-full wp-image-7684\" src=\"https:\/\/i0.wp.com\/sourcelive.hr.msu.edu\/wp-content\/uploads\/2014\/10\/ncsam-square.jpg?resize=200%2C177\" alt=\"NCSAM-square\" width=\"200\" height=\"177\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p>A simple click on an attachment or a web link by one person can lead to wide-spread consequences. Though many situations are preventable, more people need to be aware of simple precautions. October is National Cyber Security Awareness <strong>(NCSAM)<\/strong> month, and MSU is getting the word out about the role we all play in keeping the MSU\u2019s digital assets and community protected.<\/p>\n<p>\u201cEmerging cyber threats require engagement from the entire community,\u201d says MSU Chief Information Security Officer Rob McCurdy. \u201cThis month is a time to educate the MSU community on the importance of staying safe online.\u201d<\/p>\n<p><strong>NCSAM<\/strong> is a coordinated national effort held in October focusing on the need for improved online safety and security. This year\u2019s theme <em>\u201c<em>Our Shared Responsibility<\/em>,\u201d<\/em> aims to remind everyone that the Internet and technology is a shared resource and securing it is our collective duty. All users of MSU\u2019s Internet, MSUnet, should do their part in making it safer.<\/p>\n<p>To protect the confidentiality, integrity and availability of information in today&#8217;s highly networked environment, MSU is asking all of its Internet users to:<\/p>\n<ul>\n<li>Understand their roles and responsibilities related to securing institutional data as posted at <a title=\"http:\/\/eis.msu.edu\/sid\/\" href=\"http:\/\/eis.msu.edu\/sid\/\" target=\"_blank\" rel=\"noopener noreferrer\">msu.edu\/sid\/<\/a>.<\/li>\n<li>Understand the organization&#8217;s information technology security policies, procedures, and practices; specifically those listed at <a title=\"https:\/\/itservices.msu.edu\/guidelines-policies\/\" href=\"https:\/\/itservices.msu.edu\/guidelines-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">msu.edu\/guidelines-policies\/<\/a>.<\/li>\n<li>Gain knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which they are responsible.<\/li>\n<li>Stay informed and get involved by regularly visiting <a title=\"http:\/\/tech.msu.edu\/secureIT\/\" href=\"http:\/\/tech.msu.edu\/secureIT\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/tech.msu.edu\/secureIT\/<\/a>.<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>\u201cHackers have a lot of time and money to find one vulnerability,\u201d says Joanna Young, MSU vice president and chief information officer (@jcycio). \u201cAs an institution, optimally we have to find and fix all vulnerabilities, and reduce our risk. A primary example of risk reduction is MSU\u2019s planned implementation of two-factor authentication for enterprise university systems.\u201d<\/p>\n<p><strong><em>MSU\u2019s Implementation of Two-Factor Authentication<\/em><\/strong><\/p>\n<p>Cyber-attacks on computer systems and networks to obtain personal information and other confidential data take place on a daily basis. Passwords alone no longer provide a sufficient degree of safety. To maintain the integrity and security of MSU\u2019s data, the university is taking steps to increase the level of protection by implementing two-factor authentication.<\/p>\n<p>When using two-factor authentication, an individual pairs something they have (e.g., a token) with something they know (a password). It is similar to how an ATM card works. Individuals are able to withdraw money from an account because of something the person has (e.g., a bank card) and something they know (a PIN). If one of these items is lost, stolen or otherwise compromised, a wrongdoer is unable to withdraw money since they are unlikely to possess both factors. Two-factor authentication is a much stronger authentication method than a user name and password alone, and it provides protection for both the individual and the community.<\/p>\n<p>MSU\u2019s Enterprise Business Systems (EBS) will be the first group for which two-factor authentication will be applied in spring 2015. The decision to start with these systems was made due to the amount of sensitive information they hold and to help protect MSU. Once implemented for EBS, two-factor authentication will be added to additional university applications.<\/p>\n<p><strong><em>Learn More about Cyber Security<\/em><\/strong><\/p>\n<p><strong>SecureIT<\/strong><strong>, <\/strong><a title=\"http:\/\/tech.msu.edu\/SecureIT\" href=\"http:\/\/tech.msu.edu\/SecureIT\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>tech.msu.edu\/secureIT<\/strong><\/a><strong>,<\/strong> is Michigan State University\u2019s cyber security awareness initiative to keep the MSU community informed of essential behaviors for protecting themselves online so personal and university information remains secure.<\/p>\n<p><strong>Stay Safe Online, <\/strong><a title=\"http:\/\/staysafeonline.org\/\" href=\"http:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>staysafeonline.org<\/strong><\/a><strong>, provides news, tips, advice, and resources about cybersecurity and online safety issues from the National Cyber Security Alliance.<\/strong><\/p>\n<p><strong>SANS<\/strong> <strong>Securing the Human,<\/strong> <a title=\"http:\/\/www.securingthehuman.org\/resources\/ncsam\" href=\"http:\/\/www.securingthehuman.org\/resources\/ncsam\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>securingthehuman.org\/resources\/ncsam<\/strong><\/a><strong>,<\/strong> offers videos, webinars, informational resources<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While large corporations such as Home Depot, Target and JP Morgan grab the biggest headlines in terms of security issues, no organizations, including higher education institutions, are immune from threats. A simple click on an&hellip; <a class=\"continue\" href=\"https:\/\/sourcelive.hr.msu.edu\/?p=7683\">Continue Reading&#8230;<span> MSU Community Called to Protect Personal and University Information as Part of National Cyber Security Awareness Month<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"__cvm_playback_settings":[],"__cvm_video_id":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0},"categories":[9],"tags":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pb1fcA-1ZV","_links":{"self":[{"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=\/wp\/v2\/posts\/7683"}],"collection":[{"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7683"}],"version-history":[{"count":0,"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=\/wp\/v2\/posts\/7683\/revisions"}],"wp:attachment":[{"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sourcelive.hr.msu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}