Over the last several weeks the UW-Madison Cybersecurity Operations Center has observed two significant events along with several minor to important episodes which should cause all of us to pause and ask ourselves the following question: What should I be doing to keep my data and our information systems and networks safe? If you are… Continue Reading The CISO’s Perspective, special edition: Google Docs, ransomware and other adventures
Every once in a while I like to point out one of the teams in the Office of Cybersecurity and present something newsworthy. Today I want to highlight the accomplishments of the Enterprise Systems Security domain led by Christine Peterson. Over the last year the Human Resources System underwent a major overhaul as this UW… Continue Reading The CISO’s Perspective – Special Edition – Enterprise Systems Security
“It’s not important because it’s policy, its policy because it’s important.” – Gary Declute After working on it for about a year, we are in the end stages of walking the Cybersecurity Risk Management Policy through the emerging IT Governance structure. And, with great hope and anticipation, we should have it published in a few… Continue Reading The CISO’s Perspective: Now that we know what cybersecurity risk is…
Since last Saturday, many members of the UW–Madison community have received a message with the subject on the “Problem of White Genocide.” While this and other unwanted email falls into the category of spam, many found it objectionable. UW–Madison’s Office of Cybersecurity and email teams have confirmed that this message went to a few thousand people with UW–Madison… Continue Reading UW takes steps to address offensive email
There’s an inherent dilemma in effectively managing cybersecurity: IT organizations must dedicate the time and focus required for long-term strategic planning while maintaining the agility to meet evolving threats and take advantage of emerging technologies. Add in the ongoing need to review and revise strategic plans to reflect those changing risk and technology landscapes, and… Continue Reading The CISO’s Perspective: Smart cybersecurity plans balance vision and agility
This is a re-run of an article I wrote for Security Current which was based on a presentation I delivered at the IQPC Cybersecurity in Higher Education Conference in March of this year. As the flagship campus in the UW System and a major research institution in a state with open record statutes that respect… Continue Reading The CISO’s Perspective – Beyond security and privacy: the ethical use of data
Remember when you received a gift you had hoped for, asked for, badgered your parents for? How about that feeling of accomplishment you had for the day or so after you unwrapped it? The Cybersecurity team is in the process of opening several coveted gifts and are enjoying the mild euphoria of accomplishment as the… Continue Reading The CISO’s perspective: Advanced threat protection!
93 percent of all phishing emails are now ransomware. This type of malware blocks you from accessing your computer, phone or tablet, by either locking your device or by encrypting your files, until you pay a ransom. Do not pay the ransom! Here’s what you need to know about ransomware, how to protect yourself, and what to do if… Continue Reading Are you at risk of a ransomware attack?
The Office of Cybersecurity has recently received a confirmed report of compromised credentials associated with several social media and professional networking sites where an email address was used as the Login ID. This compromise resulted in the publication of password information for these accounts. These account dumps, from Myspace; Tumblr; and LinkedIn, include email addresses… Continue Reading Was your account compromised?
It’s been nearly a year since my wife and I bought our home in the Village of Oregon, Wisconsin. Methodically, room by room, she has been decorating and furnishing rooms with my home office being the most recent accomplishment. She has a keen eye for decorating and a sense of detail that reveals much about… Continue Reading The CISO’s Perspective: Sun Tzu and the art of cyberwar