November 7, 2016
“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored.
October 24, 2016
If you haven’t been following this topic in Idea Central, we had a request for bike lockers in the new building. Bike lockers look like this:
October 24, 2016
As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using, or where you are using it, we recommend the following four key steps:
October 17, 2016
During the data collection phase of the organizational assessment, we learned requests for data and information to UT System institutions from UT System Administration are a significant burden. Reducing and streamlining those requests would be an important action to take.
October 11, 2016
Welcome to Week 2 National Cyber Security Awareness Month! The second of our weekly cyber security topics is “Creating a Culture of Cybersecurity in the Workplace.”
The Internet has become an indispensable tool assisting in so many ways, from reaching new customers to enabling the mobile workforce to do its job. But being constantly connected increases the risk of online theft, fraud and abuse.