It Is Implementing New Cybersecurity Measures – Uncsa – Uncsa

IT is implementing new cybersecurity measures – UNCSA – UNCSA

Top Searches:
Neighbors Abroad, Family at Home Sep 3, 2022
Sandbox Percussion: Seven Pillars Sep 8, 2022
Guest Artist Latonia Moore, Soprano, in Recital with Allison Gagnon, Piano Sep 10, 2022
Guest Artist Latonia Moore, Soprano, Public Master Class Sep 11, 2022
Reynolda Quartet Sep 13, 2022
Dmitri Shteinberg in Recital: The Many Faces of the Classical Sonata Sep 17, 2022
A Lock Illustrated On A Computer Circuit BoardAs you are probably aware, the number of cybersecurity incidents, particularly ransomware, has been skyrocketing for some time. Like most institutions, UNCSA has been working to improve our security on many fronts. Keeping us safe and secure is Information Technology’s top priority, and we are constantly balancing safety against our ability to work with technology as efficiently as possible.
 
One area that has been difficult to secure is allowing users to install software on their PC or Mac university-issued computers. This requires administrative rights to the computer, and we have been inconsistent with applying those privileges. Granting these rights opens us up to greater threats, but not granting them makes us potentially less efficient. To further complicate the issue, the cyber insurance companies require us to restrict administrative rights on local computers as this now is considered an unsafe practice.
 
Because of this, we have purchased a system that we believe strikes a balance between efficiency and security called Admin By Request. Once deployed, if a UNCSA employee using a university-issued computer needs to install software on their machine, it is a simple matter to make a request through this system. IT will review the request, and if the software is new to us, we will perform a safety check on it and approve it for installation. Once approved for a user, a future request for the same software will be automatically permitted. For this process to be effective, a user will have to anticipate a need for the software in advance, and IT will need to be responsive when requests are made. Our turnaround time for this approval will be two business days.
 
After testing in IT is complete, we will move to test in at least 2 other departments before deploying campuswide. You will receive notice before it is deployed to your device, and we expect no interruptions to your daily work.
 
If you have any questions or concerns about this process, please contact Nick Johnson at johnsonn@uncsa.edu.
 
Thank you for supporting our efforts to keep our computing environment safe at UNCSA!
Contact: Terry Harmon
July 19, 2022
Submit an announcement
We encourage you to enable Javascript to enhance your enjoyment of our website.
1533 South Main St.
Winston-Salem, NC
27127-2738
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.
We encourage you to enable Javascript to enhance your enjoyment of our website.

source

Leave a Comment

Leave a Reply

Your email address will not be published.

Air Force Was 'Hyper Focused' on Cybersecurity for IT Networks. Now Other Systems Need Protection. – Air Force Magazine

Protect yourself online with tips from Amazon and the National Cybersecurity Alliance – About Amazon

The 10 Hottest Cybersecurity Products At Black Hat 2022 – CRN

Most organizations remain unprepared for ransomware attacks – Cybersecurity Dive