Cisco Blogs


Cisco Blog > Education

#ISTE2014 – Beyond Connectedness to the Internet of Everything

July 1, 2014 at 11:29 am PST

ISTE2014 logoISTE 2014 marks the launch of summertime for many educators as they come together to connect and share ideas about technology and innovation.  Unsurprisingly, the theme of “connectedness” continues with this year’s show in Atlanta.  The ability for schools to connect to the Internet and help make access to technology ubiquitous is changing learning in ways we probably never imagined: students can now take virtual field trips; they can access almost any information any time with the touch of a button, and traditional textbooks are going digital.  Rapid advances in technology are accelerating change.

In 2015, 25 billion devices will be connected to the Internet.  More things are connected to the Internet than there are people in the world.   By 2020, that number will double to 50 billion devices, and each person will have an average 6.58 devices.  We know that Internet of Things (IoT) connections will grow from two billion to six billion in the next five years, producing an enormous amount of information. Read More »

Tags: , , , , , , , , , ,

#HigherEdThursdays – How to Prepare a College Campus for A New Era of Innovation

impactxPublished June 18 at http://www.huffingtonpost.com/news/impactx/

Imagine what a university could and should look like in several years. What will our students be learning? How will they be learning? What tools will they need in this future education? Those questions, and many more, were asked as our team began the process of upgrading the San Jose State campus. Read more from Huffington Post

Tags: , , , ,

#HigherEdThursdays – Collaboration Redefines Higher Education.

June 12, 2014 at 8:12 am PST

The University of Nebraska at Omaha (UNO) students are learning in ways that would have seemed impossible just a decade ago.

The University’s College of Education, which is renowned for its innovative and progressive learning environment, made it their mission to give students  a professional and global experience.   By aligning collaboration technology with the University’s needs, UNO pushes the boundaries of education.

uno2

For example, with web conferencing, professors are now able to spend more time one-on-one with students and less time lecturing.  Students and faculty can attend class from remote locations, making classes more accessible to all. In addition, students are able to view online lecture notes before class, so that class time is more effectively spent in group discussions around real-life applications. Read More »

Tags: , , , ,

#HigherEdThursdays – Cybersecurity for Higher Education: Is your network protected?

Cybersecurity is a hot topic and a major concern for all organizations.  No one is immune, and indeed, higher education institutions can fall victim to large breaches as well.  In fact, according to PrivacyRights.org, below are a few examples from the last 6 months:

Date Name

Records Lost

22-Apr-14 Iowa State University

29,780

27-Mar-14 The University of Wisconsin-Parkside

15,000

20-Mar-14 Auburn University

Unknown

6-Mar-14 North Dakota State University

290,000

26-Feb-14 Indiana University

146,000

19-Feb-14 University of Maryland

309,079

27-Nov-13 Maricopa County Community College District

2,490,000

Theft, intellectual property loss, and loss of individual’s personal data affect all organizations in varying degrees.  While higher education institutions face many of the same challenges as government and commercial organizations, they also have worries that are unique to their environments. Some of the higher education specific cybersecurity topics include:

  • Data Privacy & Security – Colleges posses the Personal Identifying Information (PII) of their students AND students parents, faculty and alumni – the numbers add up quickly.  In addition to the usual PII, this can also include: medical, financial, academic and other data.
  • Device Mobility – The average student currently has 3 devices and this is expected to grow to 5 devices in the next few years.
  • Application Protection & Control – Education specific applications have become a target for bad actors and file sharing sites cause concern of digital rights violations in Higher Education.
  • Digital Learning & Assessment – On-line classes and testing provide one-to-one learning opportunities, more choice, and cost reduction in Higher Education.  It must be secure
  • Protecting Intellectual Capital – Research universities have become a prime target for intellectual property theft.   They risk loosing valuable data and the possibility of losing grant funding.

Threats have become more sophisticated and protecting the enterprise with these topics in mind needs to be more sophisticated also.  It is no longer enough to harden access to the network and think you are OK.  Because the bad guys trying to steal your data are using so many different types of attack, effective defense requires a multi-level approach.

Cisco recently acquired SourceFire, and we have adopted their frequent question to customers: “If you knew you were going to be breached, what would you do differently?”  The 2014 Cisco Annual Security Report studied the web traffic of corporate networks and every one had connections to domains that are known malware threat sites or threat vectors – an indication that bad things are on every one of these networks and likely on most networks.  Think about the question again – what would YOU do differently?  That is what we all should be doing.

We recommend looking at the Attack Continuum of  “Before, During, and After” with the following actions for each phase:

  • Before an attack you want to harden your network, to enforce security policies with controlled, segmented access to resources.
  • During an attack you want to defend your network by detecting the threats and blocking them from getting in.
  • After an attack you want to contain the threat, determine the scope of the problem, remediate the damage, and get back to educating students.

The conventional perimeter protections such as firewalls, intrusion prevention, and anti-virus are still part of a good defense in depth framework, but more is now needed.  We offer many parts of the solution, of course, and have experts who work with universities to address their specific security needs. But no matter who you work with, please look carefully at what you can do differently to protect your students and your institution from these new, advanced threats.

Our upcoming whitepaper will focus on some of these trends, challenges and strategies for higher education. You can register to receive the whitepaper as well as a compilation of all the #HigherEdThursdays blog series upon completion.  Reserve your copy now.

Happy #HigherEdThursdays!

Tags: , , , , ,

#HigherEdThursdays: The Unique Nature of the American Research University

To understand the unique nature of the American Research University, public or private, it is important to have some historical context of the Academic Research Enterprise.hedt-reserch-use

As America pursued economic growth and other national goals, its research universities emerged as a major national asset — perhaps even its most potent one. This did not happen by accident; it is the result of forward-looking and deliberate federal and state policies. These began with the Morrill Act of 1862, which established a partnership between the federal government and the states to build universities that would address the challenges of creating a modern agricultural and industrial economy for the 20th century. Read More »

Tags: , , ,