Texas Tech University

Volume 14, Number 2

View PDF

Message from the CIO

As requested by several campus administrators and individuals, we are providing an article that I wrote for Education Technology Insights earlier this year. Protecting individual and institutional data and information resources continues to be a challenging endeavor in the workplace, as well as at home. We hope you find these survival tips to be useful in protecting all the confidential and sensitive information in your life and at work. Especially because of the recent growing number of aggressive phishing attempts that we have seen at TTU, please take a moment to review these tips and share them with others in your area or life. When it comes to the protection of institutional and personal data, we are all responsible!

Sam Segran
Associate Vice President for IT and Chief Information Officer

Running the Gauntlet in Your Digital Life: Top 25 Survival Tips

Sam Segran, (June 2017), Education Technology Insights (Unabridged Version)

Over the last twenty years, I have been providing volunteer cybersecurity and cybersecurity awareness lectures to children of all ages, K-12 students, business communities, computer science and information systems classes, university faculty/students/staff, and to retirees (generally the people with the most assets to protect and the least knowledge to protect themselves online.) At the end of most of these sessions, I left the audience with a quick cybersecurity checklist. In the early years, it was just a few items. Since then, my list has steadily grown to 25 items as our digital world has expanded.

While this checklist is intended as a personal checklist, there are many items in the list that are still applicable to organizations as well. The checklist may be obvious to many in the IT field. However, in my experience, no one is really fully protected from some of the modern day cybercriminals; especially from cybercriminals who are skilled and have access to hacker tools and their own tech support from underground, cybercriminal organizations.

Of course, each of the above items by itself will not secure someone's digital assets or life. In articles, conferences, and training, it is painfully disappointing to hear vendors and even IT security professionals disparaging one of these items in favor of another, e.g. knocking cybersecurity awareness in favor of security controls, or proclaiming anti-virus is dead because of advanced Artificial Intelligence-based advanced threat protections. These items should complement one another and help us all be more secure in our cyber world by giving us multi layers of protection. Adhering to this checklist won't ensure perfect security, as nothing can. However, it certainly can help us become a smaller target and reduce the attack surface for the cybercriminals.

If we plan properly and prepare for our digital life as we do (or should do) in our real life, we will be in a better position to enjoy the benefits resulting from technology changes rather than being constantly stressed by the threats from cybercriminals. Let's enjoy life along the way. As John Lennon sang in “Beautiful Boy”, “Before you cross the street take my hand. Life is what happens to you while you're busy making other plans.”