"For decades, bad actors have exploited computer systems by finding vulnerabilities in the systems themselves, but now, in a vast world of connected devices, users have become the soft underbelly of each organization, especially in educational communities."—Source: EdScoop
WHY THIS MATTERS:
Riddle me this: how do you keep research and digital communications open and accessibly while also protecting school's vulnerable data? Learn some top tips for human-centered data security from the University of Montana and other leaders in the field.