CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
The Impact of Technology on Research

Christine Burns, Chief Information Officer, University Of Technology Sydney

The Power of Partnering in Educational Technology

Paul Oppenheimer, CIO, and Sue Bolt, Director Planning & Resources, RMIT University

Key principles for campus technology investments

Jeff Murray, CIO, University of Tasmania

Technology Driving Change in Higher Education

Anthony Molinia, CIO IT Services, University of Newcastle

Discovering the Unique Possibilities in Higher Education

Anthony Molinia, CIO, IT Services, University of Newcastle

What is the Next Big Thing?

Jeff Murray, CIO, University of Tasmania

Using Data Dashboards to Support Struggling Students: A Big Data Application in Higher Education..

Chris Harris, Executive Dean, Kaplan Singapore

The digital enterprise decision maker

Mary-Lou O'Brien, Chief Digital Officer, Melbourne Girls Grammar

right

THANK YOU FOR SUBSCRIBING

Keeping the Administration's Cybersecurity in Check

CIOAdvisor Apac | Monday, July 08, 2019
Tweet

Channel in the best security measures to help users and administration alike to keep away from cyber threats.

FREMONT, CA: As soon as a new semester commences in schools, faculty and students resolve into their regular tasks. It is necessary to keep a check and revive the cybersecurity of the organization. In light of this, October has been designated as the National Cybersecurity Awareness Month.

Here are a few good practices to start with for a safe and secure online network:

Practice Necessary Cyber Hygiene

Copious school credentials are already on the part of WWW’s dark web, which makes it vital to maintain the login data protected from the hackers. A simple way to track this is by using secured passwords. Adding to the list of best practices are bringing into play the different combinations of characters, not reusing the passwords provided by the university, making sure to use long codewords is permitted, changing keys whenever they are under threat and not sharing them.

In accord with the above methods, the best ways to incorporate security measures are thumbprint recognition and multifactor authentication wherever possible. Another essential outlook to put into practice is to become familiarized with how phishing works because the present day phishers are one step ahead of people. With a continuous circulation of fraud emails, it is imperative for the administrations to alert the consumers on the current scams and educate them on how to recognize distrustful mails that float in the inbox.

Introduce Fine Safety Customs

Strengthen good habits and keep them up at home and workplace along with the devices to diminish the line between the two as this tactic helps users be responsible for their security.  Besides, another strategy is to encourage students and faculty to use virtual private network (VPN), a platform that allows them to work from anywhere while keeping the connection secure. The IT staff is responsible to keep a check on the VPNs so that it is easy to exercise.

tag

Cyber Threats

VOIP

spam

Fraud

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/keeping-the-administration-s-cybersecurity-in-check-nwid-1693.html