Month: March 2015

By Sharon A. Aronovitch, PhD, RN, CWOCN Lead Faculty Program Director, Graduate Nursing Program Holly Evans Madison, PhD, RN Faculty Program Director, Graduate Nursing  Robin Dewald, PhD, RN, CNE Faculty Program Director, Graduate Nursing For those of you who have started taking your Phase 2 MS courses (specialization track), you are beginning to see the light at …

The Excelsior College OWL (online writing lab) is a free online resource designed to help students with writing—in a warm, engaging, media-rich environment. At eLearning 2015, ITC presented OWL with the ITC 2015 award for Outstanding New Technology or Delivery System, and this month, the Excelsior College OWL released a brand new learning area: Argument …

There have been a number of recent events that have forced organizations to reevaluate the possibility of insider threats. In order to deal with insider threats a security analyst must have a very different mindset towards security than they have for dealing with external threats. The insider threat can be characterized by three issues: why …

  Grass, G. (2015, February, 19) Update: Spy agencies hacked SIM card maker’s encryption. Retrieved March 25, 2015, from http://www.computerworld.com/article/2886738/spy-agencies-hacked-sim-card-makers-encryption.html Leyden, J. (1014 12–18). CoolReaper pre-installed malware creates backdoor on Chinese Androids. Retrieved March 25, 2015, from http://www.theregister.co.uk/2014/12/18/coolreaper_android_backdoor/ Mendoza , J & Prasad, R. (2015, February 26). Corporate espionage case: Companies turn to IT security …

Beating the odds A great deal has been written about the small percentage of women in technology. Currently the rate stands at about 20-23%….give or take a few points. We also hear about the efforts that are underway to attract more young women into the field and how to keep them involved. But what we …

A CALL FOR ABSTRACTS & PAPERS National Cybersecurity Institute Journal Special Issue—The Role of Community Colleges in Developing the Cybersecurity Workforce National Cybersecurity Institute Journal, in collaboration with the National CyberWatch Center, is extending a special issue call for abstracts and papers on the role of community colleges in developing the cybersecurity workforce. This special …

The trend for cyber-attacks against small businesses is reportedly increasing. But since mainstream media seldom reports the details of attacks against small businesses, it is hard for people outside of the cybersecurity world to know what crimes are really happening. Here is a selection of cyber-crimes that occurred in the last few months. The actual …

Image of woman eating an apple

By Fran Ludwig, MS,  RN Faculty Program Director, BS Nursing Program It’s true: you are what you eat. March is National Nutrition Month and it’s a good time to examine your habits. Nutritional expects have provided scientific proof that what we put into our mouths will and does influence our performance as well as our physical and …

On March 18, 2015, the National Cybersecurity Institute (NCI) hosted a webinar entitled “Doing Business Overseas: What Changes on the Cyber Front?” The webinar examined a number of the issues and differences in doing business internationally from a cybersecurity point of view. Issues like the variation in legal systems, privacy concerns, and protection of intellectual …