The media attention on cyber attacks against large enterprises may create a false sense of security for smaller organizations, according to the small and mid-sized business (SMB) snapshot of the Verizon 2022 Data Breach Investigations Report (DBIR) notes.  Small businesses may think they’re flying under the radar with threat actors because there is less to steal. After all, why worry about your security culture when attackers are likely to get more money and more data from larger organizations, right? Unfortunately, that’s not the case.

One side effect of the pandemic is the increase in student mobile engagement, with mobile devices now widely used for higher education. According to a 2021 survey conducted by Educause, most college students use more than one device for academic work, and more than half rely on a smartphone.

School cyber attacks are on the rise worldwide, perhaps exacerbated by a pandemic that forced schools worldwide to pivot and utilize more digital resources. Just one 2022 attack was responsible for the websites of 5,000 schools, mostly in the U.S., going offline.

It’s mid-January already. How are you doing on your learning program resolutions for 2023? Are you staying on track, or are you already sliding back into some bad habits?

The adoption of OER (Open Educational Resources) is on the rise. According to a report from Babson Research Group, almost half of the faculty surveyed for the report are aware of OER and, for the first time in its history, more faculty report a preference for digital rather than physical class materials. In a recent Campus Technology survey, faculty members singled out proprietary publisher content as something they’d like to see disappear.

Among instructors, OER has an increasingly passionat…

Working the IT help desk can be a great entry-level job. As a help desk professional, your core responsibilities are to provide technical help and support; that could mean setting up and repairing computers or responding to a customer’s question about how to use their computer. It could also mean performing routine maintenance of a company’s computer networks and internet systems or teaching staff how to use new technologies.

It’s a good gig, and it can be fulfilling. The median salary for co…

IT professionals of all stripes—programmers, theoreticians, engineers—are in high demand these days.

The Bureau of Labor Statistics projects that employment of software developers will grow by 24 percent and employment of app developers by 31 percent by 2026—rates that far outpace the average growth of other occupations.

Tech industries like artificial intelligence, information security, and enterprise software, Forbes says, are hiring computer scientists, tech specialists, and programmers in…

When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss.

According to Ponemon’s 2018 Cost of a Data Breach report, third-party breaches cost more than in-house breaches, at $13 per compromised record.

However, data breaches arising from vendor errors are common; 59% of respondents to Ponemon’s 2018 Data Risk in the Third-Party Ecosystem report reported a third…

There are a lot of reasons not to invest in training for gig workers. For one thing, mandatory training for contract workers is illegal in the U.S., but there’s a lot more to this story, so let’s dig into it.

Most companies in the sharing economy rely on independent contractors to provide their services — these workers sign up to do a job without becoming employees. That means companies don’t have to pay benefits, but that also means they can’t make their employees do certain things, like tak…