The Protect IU Blog
Posted byon March 21, 2013 at 11:26 AM EDT
Celebration of life service: 4:00pm Monday, March 25, 2013, IU Auditorium, Bloomington
Posted byon March 20, 2013 at 11:16 AM EDT
According to both Protiviti and the North Carolina State University’s Poole College of Management, the proper placement of the Chief Risk Officer (CRO) is vital to getting the most out of the position. And, we couldn’t agree more. The CRO is charged with many responsibilities, among them the ability to stimulate discussions and think against the grain. In fact, the ERM Initiative Faculty at NCSU stateLearn more about protecting:
Posted byon March 8, 2013 at 4:22 PM EST
We are pleased to announce Domain 12: Compliance, of our IU Information Security and Privacy Program.
Since the program is vast, like an encyclopedia, and can be difficult to digest at once, our "12 Domains in 12 Months" campaign encouraged the review of one domain per month -- in hopes to make it easier to study each domain's resources and gauge your local efforts towards meeting the objectives.Learn more about protecting:
Posted byon February 28, 2013 at 4:55 PM EST
March 1 is the first day of "meteorological spring". For IUEMC that means it's Storm Spotter season! With a class at IUPUI on March 19, let's talk about weather some more.Learn more about protecting:
Posted byon February 28, 2013 at 10:40 AM EST
Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.
You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.
Information about these different types of verification is included:Learn more about protecting:
Posted byon February 21, 2013 at 10:16 AM EST
The Paradigm Shift
One might think that as an IT security professional I would wish to tactfully discourage the use of Cloud computing; however, that is not entirely the case. Cloud computing opens avenues for collaboration on a scale never before realized by those wishing to integrate in thought and data sharing. Cloud computing virtually dissolves limitations defined by enterprise level networks and even geographical spans. As technology connects individuals, potentially on a global scale, our abilities to develop peer relations and interactions are greatly enhanced.Learn more about protecting:
Posted byon February 18, 2013 at 12:01 PM EST
Whole-disk encryption (WDE) provides an added layer of security for the data on your computer. Tools exist which can circumvent this technology under certain conditions. Lately, you may have heard about a tool from Elcomsoft which combines many popular WDE cracking methods in one.
Some attacks you are probably aware of. If an attacker can guess the encryption password through brute force, he can decrypt the disk without any tools. That's why a good passphrase is a critical part of the encryption process.Learn more about protecting:
Posted byon February 15, 2013 at 12:39 PM EST
The old viewpoint that innovation only occurs at growing organizations who take risks has long been dismissed by many leading universities and corporations. However, the idea that enterprise risk management (ERM) can co-exist with innovation, let alone promote and partner with it, is still viewed as polarizing. But, is this accurate?Learn more about protecting:
Posted byon February 8, 2013 at 1:29 PM EST
Universal Plug and Play (UPnP) is a protocol standard that allows communication between computers and network-enabled devices. UPnP allows devices to discover each other on the network and establish functional network services for data sharing and communication. This protocol is enabled by default on millions of devices, including routers, printers, media servers, IP cameras, smart TVs, home automation systems, and network storage servers.
Learn more about protecting:
Posted byon February 6, 2013 at 5:50 PM EST
Chief Patricia Nowak writes: "On January 2, 2013 Wayne James was promoted to Lieutenant. His outstanding work and leadership abilities has made this a natural transition. Lt. James has received multiple awards through the years, including receiving a purple heart for saving a man who was shot and injured. On July 13, 2011, Lt. James pulled the man to safety even when gun shot rounds continued. He and other Indiana University and Gary officers located and arrested the suspect."
"Lt. James is an excellent choice for this important leadership and high command role."Learn more about protecting: