Kaltura is updating the clipping and trimming tool for all customers on Sunday, January 14th. A new, HTML5, video editor tool will be available to all users of the Minnesota State instance of Kaltura Mediaspace.
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.
ECAR collaborated with 157 institutions to collect responses from 13,451 faculty respondents across 7 countries about their technology experiences. ECAR also collaborated with 124 institutions to collect responses from 43,559 undergraduate students across 10 countries about their technology experiences. Please see the 2017 student and faculty studies hub for more about this year’s research.
When it comes to meeting technological support needs, students’ default modality is DIY. Students are more than twice as likely to figure out solutions to technology problems on their own, to search online sources, or to ask a friend than they are to use their campus help desk. Contacting the vendor or company to fix a technology problem is the last resort.
Laptops are king, smartphones are queen, and tablets are on the way out.
Students’ experiences with their instructors’ use of and approach to technology in the classroom are a mixed bag. A majority of students said most of their instructors have adequate technology skills, use technology to enhance learning, and encourage the use of collaborative technology tools. However, students said fewer faculty use technology for sophisticated learning tasks (e.g., engagement, creative and critical thinking), and relatively few faculty ask students to use their own devices for in-class work.
Students are choosing sides in the online versus face-to-face debate. For the fourth year in a row, the number of students preferring a blended learning environment that includes some to mostly online components has increased. The number of students preferring completely face-to-face or completely online courses continues to dwindle. The number of students expressing no preference has been cut by more than half since 2014.
Students are satisfied with features of their LMS…except when they aren’t.Students have favorable opinions about the basic features and functionalities of their LMS. But, the more sophisticated the task and the more engagement required of students, the less happy they tend to be. This may be a function of the tools, the instructors who use them, or both.
Students would like their instructors to use more technology in their classes.Technologies that provide students with something (e.g., lecture capture, early-alert systems, LMS, search tools) are more desired than those that require students to give something (e.g., social media, use of their own devices, in-class polling tools). We speculate that sound pedagogy and technology use tied to specific learning outcomes and goals may improve the desirability of the latter.
Students reported that faculty are banning or discouraging the use of laptops, tablets, and (especially) smartphones more often than in previous years. Some students reported using their devices (especially their smartphones) for nonclass activities, which might explain the instructor policies they are experiencing. However, they also reported using their devices for productive classroom activities (e.g., taking notes, researching additional sources of information, and instructor-directed activities).
Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety