Data Breaches and Educational Institutions

Marjorie Spivak, Taylor Ey, and Liz LeVan Riley of Womble Bond Dickinson (US) LLP write:

Consider these five steps during your summer break to address the protection of confidential information and combat cybersecurity risks before the start of fall semester.

1. Information Assessment: Identify what data your institution holds, how it is used, how is it protected, and who has access

[…]

2. Asset Assessment: Routinely assess network devices, systems and software platforms within the institution to ensure technical solutions; monitor for suspicious activity; and identify organizational solutions that minimize risk

Read more on The National Law Review.

About the author: Dissent

Comments are closed.