Hey, take care of yourself!

When was the last time you did something for yourself?  Besides taking courses and exams, many of our students are managing multiple commitments like work, family, and personal time.  That’s right, we said it, “personal time.”  Some of you may be laughing at this and thinking that you have no free time.  The idea of stepping away to relax may even create stress.

iloveyoucouchWe want you to have a goal to relax.  Whether it’s by binge watching an entire series on Netflix (House of Cards?) or taking a 10 minute nap, you may find that this will help you to refocus and replenish your energy levels.  You also may find that your stress level decreases.  This week and in future weeks we encourage you to TREAT YO SELF!  Excelsior College students are some of the most hardworking and dedicated students on the planet and we want to make sure you get the rest you deserve.

Your Success Coaches,

Savannah & Hannah

FDA Draft: Postmarket Management of Cybersecurity in Medical Devices

The FDA recently released new guidance for managing cybersecurity in medical devices. The guidance emphasizes the manufacturers need to monitor, identify, and address cybersecurity vulnerabilities and exploits. This document is guidance and does not establish legally enforceable responsibilities.

Cybersecurity is essential to our health.
Through this document as well as the premarket cybersecurity guidance, the FDA encourages the use of the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The cybersecurity framework core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. When considered together, these functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk. These five elements should be included in the manufacturer’s cybersecurity risk management program.

The manufacturer, working with the stakeholders can greatly enhance the security of medical devices by implementing a comprehensive cybersecurity framework. This framework should include timely mitigation of identified vulnerabilities and exploits.

Learn more about cybersecurity training for healthcare here by reading chapter 3 in Protecting Our Future (Vol 1).

Source:
FDA (2016, January, 22). Postmarket Management Cybersecurity in Medical Devices: Draft Guidance for Industry and Food and Drug Administration Staff. Retrieved from http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf

Talking to Your Doctor: Never Too Much Information

Gary McClain, PhD, is a therapist, patient advocate, and writer who specializes in helping clients—as well as their family members and professional caregivers—deal with the emotional impact of chronic and life-threatening illnesses.

Nancy made a list of things to let her doctor know about at her next appointment. It included a few unfamiliar symptoms, some changes she had made to her diet, and a new medication prescribed by another physician.

While she was in the waiting room, Nancy took a look at the list she had made. It seemed kind of long, and she knew her doctor was having an especially busy day. Out of concern that she might waste his time, Nancy reviewed the list she had made. As she went through each item on the list, she started asking herself if it was something she needed to bring up, if it could wait until some other time, or even if it was something that might make her seem overly concerned, or a hypochondriac. She crossed out more than half the items on the list.

As her appointment with her doctor was coming to an end, her doctor said, “Before you leave, anything else going on?”

Nancy felt like she had mentioned everything she had decided was important from her list. So she answered, “I brought a longer list with me, but decided most of it would be a waste of your time to hear about.”

“Nancy,” her doctor said, “how about if you let me make that decision?”

To tell or not to tell

What about you? Do you tell your doctor anything and everything that might be relevant or important? Or, like Nancy, do you hold back out of fear of being a time waster or labeled a high-maintenance patient?

Here are a few things to think about when it comes to keeping your doctor informed:

Write it down and bring it in. Keep an ongoing list of anything that concerns you—symptoms, diet changes, additional medications, and anything else that’s been on your mind. Bring it to your appointment with your doctor. Don’t talk yourself out of having it handy to go over with your doctor. You’re helping your doctor do his/her job when you’re prepared with information they may need to know about.

To read more, please visit Diabetic Connect.

The White Hat Women Pipeline: Solve Today’s Problems for Tomorrow’s Cybersecurity

Cybersecurity has dominated the news as of late and is considered a major pain point for both consumers and corporations. Black hat hackers have become the veritable villains of the cyber world, calling into question the integrity of digital infrastructures. Their altruistic counterparts – white hat hackers – are few and far between. This is only compounded by the fact that very few organizations had made solid investments in durable cyber security until after they were hit by cyber threats.

Women in cybersecurity professions are just as, if not more, tricky to find. Consider this: 77 percent of females claim that not a single high school teacher or counselor encouraged them to pursue cybersecurity. Moreover, a mere 33 percent of women understand what a cyber security job would entail, and 52 percent don’t even believe there are courses in cybersecurity for them.

As it stands today, women make up only 10 percent of the cyber security workforce. The reasons listed above are only a few of the roadblocks preventing more women workers in the field of cybersecurity. The workforce needs more women to pursue data protection jobs. In just one year, the world will need nearly 2 million more white hat hackers.

Women could potentially provide a valuable perspective to this profession considering to this point the field has been so male-dominated. The first step towards more female inclusion in cybersecurity will involve the restructuring of perceptions surrounding cybersecurity. These positions aren’t for isolated hackers; they are fit for educated professionals with an interest in policy and process training.

Data security leaders need to start treating professionals in cybersecurity as the valuable and capable employees they are. There need to be major improvements in workplace relations as well as the reinvention of job postings.

For women interested in cybersecurity, Excelsior College has an extensive database of female roles models. Check out the National Cybersecurity Institute’s Initiative for Women in Cybersecurity today for all your training and career guidance needs.

Webinar: Cyber Liability Insurance

On March 28, the National Cybersecurity Institute (NCI) hosted a webinar on Cyber Liability Insurance.

According to the Identity Theft Resource Center, there were 781 data breaches reported in 2015 alone, compromising nearly 170 million private records. As these numbers continue to skyrocket, the prevailing question has become not if you will experience a data breach but when. Developing a strategy in this rapidly changing environment presents significant challenges. Correspondingly in the last year there has been a surge of cyber liability insurance adoption, and with it an influx of new questions.See webinar in full screen

This webinar explored the role cyber liability Insurance plays in risk management strategy including discussion of questions like: Do we need cyber insurance? How does it fit into our risk strategy? What is the right coverage, and how do we prepare for a cyber-intrusion or data breach incident?

The webinar was presented by Steve Lobel. As an entrepreneur, Steve Lobel spent his formative years starting and growing several business ventures. For the last 18 years he has been Vice President at Anchor Agency, Inc., a full service independent insurance agency in Albany, NY. Since the early days of the internet, Steve has specialized in insurance products and services that address the complex and rapidly changing risks associated with E-commerce and Information Technology. He has developed a holistic suite of services designed to enable both start-up and mature businesses to manage risk and function effectively in the electronic age. His specialties include: Cyber Liability, Errors & Omissions, Professional Liability, Alternative Energy, and other niche markets. He has attained the professional designation CIC (Certified Insurance Counselor).

 

Webinar: President Obama’s National Cybersecurity Action Plan of 2016

On March 24, the National Cybersecurity Institute (NCI) hosted a webinar on President Obama’s National Cybersecurity Action Plan of 2016.See webinar in full screen

As part of the President’s FY-17 Budget, President Obama seeks to establish improving the nation’s cybersecurity posture as one of the legacies of his administration. This webinar examined the details of the proposal and assessed the possibility of enacting significant improvements in U.S. cybersecurity.

The webinar was presented by Dr. Kevin Newmeyer. Currently the Senior Operations Director for the CREATE™ project of the DoD High Performance Computing Modernization Program, Dr. Newmeyer has successfully held a variety of positions in the military, academia, international civil service, and the private sector. His research focuses on international policy issues in cybersecurity. Along with his Ph.D. in Public Policy from Walden University, Dr. Newmeyer’s educational career is highlighted by his selection as an Olmsted Scholar which enabled him to earn his MA in International Relations from the Instituto Universitario Ortega y Gasset in Madrid, Spain. He holds additional degrees from Escuela Diplomática of Spain (Diplomado de Estudios Internacionales), George Mason University (MBA), and the US Naval Academy (BS). Dr. Newmeyer is also a fellow at the National Cybersecurity Institute.

 

How to Combat Insider Threat Using Behavioral Science

Managing threats by monitoring employee behavior
Managing threats by monitoring employee behavior

Countering cyber threats in not just a technical challenge, it is also a human challenge. A goal for organizations is to deter insider threat before it even happens, and understanding human behavior is essential for doing that. Organizations have to be able to deter employees from making bad decisions in the first place by first letting them know they are being watched and that they’re likely to be caught. That’s the detection part. And then letting employees know the organization cares if they’re having a rough time and has programs in place to assist them. That’s the mitigation part.
When I was a special agent for several government agencies I learned a lot about understanding human behavior and how I could use that to solve crimes. Now that I work in cybersecurity these same skills come in handy when trying to combat insider threat. If cybersecurity professionals have not been trained in human behavior they can take a few classes on the subject or they can engage behavioral scientist to advise them on defining normal, baseline user behavior, how to identify abnormal changes to that baseline and what those changes might mean.
One of the main things I was taught as an agent was how to look for what were known as fraud indicators, which basically is suspicious behavior. I was trained to recognize deviations from normal behavior, which are called “triggers.” Common triggers for insider threat might include employees’ use of removable media, their use of printers or copiers far from their office, or employees logging onto the computer system during hours when they are not assigned to work.
Cybersecurity engineers rely on triggers such as these when they design automated monitoring systems. Unfortunately, many monitoring systems are designed around single triggers which often leads to false alarms. Automated systems need to be able to base their decisions on multiple triggers, which is easier said than done.
For cybersecurity professionals mitigating insider threats often means fixing the damage done by an insider attack. However, for behavioral scientists, it also means examining the mitigating factors within an organization that can increase or decrease the chance of an insider threat in the first place, or preventing it from happening again.
The known triggers of disgruntlement and ego often play a role in motivating insider attacks. As examples, to mitigate disgruntlement, organizations can provide employees with avenues to vent concerns and frustration. To mitigate ego, organizations can implement employee recognition programs that offer more public praise.

Greed, another trigger that leads employees to such things as selling organizational secrets, can be another motivation for insider attacks. It will be difficult for cyber professionals to deter an employee who conducts and inside attack due to greed, but organizations can certainly address such things as grievances due to perceived inequities in compensation which may have led to the insider threat incident.
Insider threat detection programs need to include consultation with behavioral scientists when it comes to deterring insider threat issues. Technology always in some way involves human beings so you can’t tackle a technological challenge without taking into account human nature. And the experts in human nature are behavioral scientists.
Read about using Behavioral Analytics to help identify warning signs in employee behavior at http://www.nationalcybersecurityinstitute.org/hactivism-terrorism-crime-and-espionage/uncover-insider-threats-through-user-behavior-analytics/
Source: Mitre (2012, October).The Human Factor: Using Behavioral Science to Counter Insider Threats. http://www.mitre.org/publications/project-stories/the-human-factor-using-behavioral-science-to-counter-insider-threats

Finding Free Uninterrupted Study Time

yoda studyAs you gear up for the Spring II term, ask yourself “Do I have free uninterrupted study time built into my weekly schedule?”  As Success Coaches in the Student Success Center, a common trend we are finding with students is that they have good intentions of studying, however they wake up each day not knowing when that study time is going to be.  That unknown makes finding study time blurry.  We completely understand why identifying study time can be difficult.  As students you have other responsibilities going on in life besides studying.  We want you to try a small activity with us.  It has worked for the students we have met with, and as students ourselves going through the Masters of Science in Management program at Excelsior College.

For one week straight write down the times that you are free and uninterrupted in your schedule.  Also identify your energy levels during these times.  Are your energy levels high, medium, or low?  You may have free uninterrupted time from 9:00 to 10:00 pm at night, however keeping your eyes open to read a chapter may be a struggle.  Thus, it may be best to avoid this time to study.  At the end of the week analyze the times that worked best for you, and what did not work.  The times you identified not to work may be great for relaxing and reenergizing.  Yes, WE ARE TELLING YOU TO TAKE A BREAK!  You may be surprised with all the free time you have at the end of this activity.  Please feel free to let us know how this works!

Your Success Coaches,

Hannah & Savannah

Excelsior College and Westchester Community College collaboration to build pipeline of bachelor’s educated students

Excelsior College and Westchester Community College (WCC) hosted a signing ceremony on February 16, 2016 to reaffirm their academic partnership, which provides community college students with an affordable pathway to a bachelor’s degree via significant tuition discounts and the seamless transfer of earned credits.

Under this agreement, students who obtain a Westchester Community College associate degree may apply a maximum of 90 lower-level credits toward an articulated bachelor’s degree program at Excelsior.

In addition, the institutions announced a separate concurrent enrollment, which will allow students enrolled in the Associate in Applied Science (AAS) in nursing at Westchester Community College to pursue a Bachelor of Science in nursing at Excelsior College at the same time, thereby shortening their time to degree completion. These concurrently enrolled students will be able to take advantage of federal financial aid programs.

“These types of institutional partnerships provide a pathway to a degree that may not otherwise exist at a time when college graduates are needed more than ever,” said Patrick Jones, PhD, vice provost at Excelsior. “With global competition on the rise and the federal government predicting a labor shortage of more than 35 million educated workers over the next 30 years, degree completion and economic prosperity have never been more intertwined.”

“This partnership defines guided pathways for our graduates ensuring a seamless transfer process and maximization of student resources (time and money) in their degree completion. Excelsior offers flexible online programs which will help many working students pursue their educational advancement simultaneously while balancing many of life’s responsibilities,” said Dr. Peggy Bradford, interim vice president and dean of academic affairs at Westchester Community College.  “We are especially delighted for students in the nursing program who can accelerate their educational journey to a bachelor’s degree in nursing with the new concurrent enrollment program.”

Excelsior College, a private, nonprofit distance learning institution, has served the adult learner since 1971. The institution comprises five schools – Business and Technology, Health Sciences, Liberal Arts, Nursing, and Public Service, as well as an Extended Education division and multiple centers. It offers more than 35 programs at both the undergraduate and graduate level as well as a variety of credit and non-credit certificates and courses. Enrolled students can choose among multiple options to complete their degree, including transfer, prior learning assessment, credit by examination, and online courses.

Excelsior’s nursing programs are accredited by the Accreditation Commission for Education in Nursing, Inc. (ACEN). It has been designated a Center for Excellence in Nursing Education by the National League for Nursing three times.

 

###

Excelsior College

Excelsior College is a regionally accredited, nonprofit distance learning institution that focuses on removing obstacles to the educational goals of adult learners. Founded in 1971 and located in Albany, NY, Excelsior is a proven leader in the assessment and validation of student knowledge. It offers more efficient and affordable access to degree completion through multiple avenues: its own online courses and college-level proficiency examinations, and the acceptance in transfer of credit from other colleges and universities as well as recognized corporate and military training programs. Excelsior College is accredited by the Middle States Commission on Higher Education.

Pearson awards Excelsior’s Darren Walsh with national online learning excellence award

Excelsior’s Darren Walsh, assistant vice president of learning and academic support services, was recognized with an online learning excellence award by Pearson at the 16th annual Cite Online Learning Conference, held yesterday in Jacksonville, Florida.

The awards are divided into two categories: K-12 and higher education — Excellence in Online Administration and Excellence in Online Teaching. As part of Pearson’s commitment to inspire and support excellence in online education that drives student success, the company will donate $1,500 to the scholarship fund of each winner’s choice.

In the announcement, Pearson describes Walsh’s achievements:

Darren Walsh is the technical developer and administrator of a new, highly innovative and completely open-source online writing lab, the Excelsior College OWL (OWL). Under his leadership, the OWL is highly innovative, offering the first-of-its-kind writing support in an open-source environment, one that is designed to respond to the writing crisis in the United States. The EC OWL is unique because it was built from scratch to provide seamlessly integrated multimedia content, and it can be used for free by students, faculty, and programs throughout the world. A national study involving six colleges and 152 students found that students using the OWL in their courses scored 6.6 points higher for their final grades compared to students not learning with the online lab. Walsh is an innovator beyond this new resource as well. In his position he oversees the development of a wide variety of online student resources, including a student orientation, library, career center, bookstore, online student success guide, and integrated online tutoring into the course design process.

Review the full release: http://www.prweb.com/releases/2016/02/prweb13206959.htm

Webinar: Center for Academic Excellence – Knowledge Unit Mapping

On February 25, the National Cybersecurity Institute (NCI) hosted a webinar on the “Center for Academic Excellence – Knowledge Unit Mapping”.See webinar in full screen

Excelsior College is taking the initiative to produce quality members of the workforce in Cybersecurity. As a Center for Academic Excellence in Cyber Defense the college continues to align their course and program outcomes to the standards put forth by the NSA.

This webinar is part of a new series that focuses on Knowledge Unit Mapping. This webinar focused on Cyber Defense and Cyber Threats and what Excelsior College is doing to assure learners have the proper skills to be outstanding members of the Cybersecurity workforce.

The webinar was presented by Dr. Andrew Hurd. Dr. Hurd is the Faculty Program Director for Cybersecurity at Excelsior College. He is responsible for curriculum development and degree requirements for the Bachelors and Master degrees in Cybersecurity. Prior to joining Excelsior, Dr. Hurd worked at Hudson Valley CC and SUNY Albany. He holds dual Bachelors of Arts in Computer Science and Mathematics, a Masters in the Science of teaching mathematics, and a PhD in Information Sciences specialized in Information Assurance and Online Learning. Dr. Hurd also won the SUNY Chancellors award for Excellence in Teaching in 2012 while working at HVCC.