All articles by
Fraudulent LinkedIn Profiles
CEOs and high profile staff are often targets for LinkedIn fraud. The fraudsters develop fake profiles, with fake photos. They sometimes cut and paste from real profiles. The photos may ….
Posted on March 21, 2016
UPDATED – History at Excelsior: Advice about Your Course, Career, and Graduate School Options
*Update: The recording of this webinar is now available: https://connect.excelsior.edu/p36hs8fho5c/ Are you a History major, do you have a depth in History, or are thinking about focusing on History? ….
Posted on March 21, 2016
Hey, take care of yourself!
When was the last time you did something for yourself? Besides taking courses and exams, many of our students are managing multiple commitments like work, family, and personal time. That’s ….
Posted on March 20, 2016
FDA Draft: Postmarket Management of Cybersecurity in Medical Devices
The FDA recently released new guidance for managing cybersecurity in medical devices. The guidance emphasizes the manufacturers need to monitor, identify, and address cybersecurity vulnerabilities and exploits. This document is ….
Posted on March 16, 2016
Talking to Your Doctor: Never Too Much Information
Gary McClain, PhD, is a therapist, patient advocate, and writer who specializes in helping clients—as well as their family members and professional caregivers—deal with the emotional impact of chronic and ….
Posted on March 15, 2016
The White Hat Women Pipeline: Solve Today’s Problems for Tomorrow’s Cybersecurity
The work force needs more women to pursue data protection jobs..
Posted on March 8, 2016
Webinar: Cyber Liability Insurance
On March 28, the National Cybersecurity Institute (NCI) hosted a webinar on Cyber Liability Insurance. According to the Identity Theft Resource Center, there were 781 data breaches reported in 2015 ….
Posted on March 2, 2016
Webinar: President Obama’s National Cybersecurity Action Plan of 2016
On March 24, the National Cybersecurity Institute (NCI) hosted a webinar on President Obama’s National Cybersecurity Action Plan of 2016. As part of the President’s FY-17 Budget, President Obama seeks to ….
Posted on March 2, 2016
How to Combat Insider Threat Using Behavioral Science
Countering cyber threats in not just a technical challenge, it is also a human challenge. A goal for organizations is to deter insider threat before it even happens, and understanding ….
Posted on March 1, 2016
Finding Free Uninterrupted Study Time
As you gear up for the Spring II term, ask yourself “Do I have free uninterrupted study time built into my weekly schedule?” As Success Coaches in the Student Success ….
Posted on February 25, 2016