Identity Automation's Identity and Access Management Blog

Stay up to date with all of the latest news and events.

2016 was the year of the hacker. From Russian hackers targeting US elections to the jaw-dropping compromise of more than 1 million Yahoo! user accounts and the DDoS attack that "broke the Internet," it seems like hacks and data breaches were in the news every day. Russian hackers aside, ransomware was the cybersecurity topic that captured the year’s headlines.

Earlier this week, we released the most popular blog posts in 2016 from our Enterprise Blog. So today, we wanted to do the same with our K12 and higher education blog posts. After all, we’ve covered a variety of identity and access management (IAM) topics this year on our Education blog, including unique IAM challenges in higher ed, managing contingent users, provisioning users with multiple roles, and student data rostering.

Previously in our two-part series on the identity and access challenges unique to higher education, we discussed users with multiple roles, the increasing use of technology in the classroom, and limited budget and manpower. As you may already have guessed, these challenges are just the beginning.

This week, I’m heading to Sacramento, California for the 2016 CETPA Annual Conference. Held by the California Educational Technology Professionals Association (CETPA), the conference is attended by IT professionals from K-12 school districts throughout the state.

In today’s educational landscape, universities and colleges face distinct identity and access challenges unlike those encountered in retail and other commercial environments. And while retail, financial services, and the like are generally viewed as higher-risk from a cybersecurity point of view, the risks to higher education are just as critical. In fact, higher education “accounts for 17 percent of all reported data breaches, ranking second only to the medical industry,” according to Privacy Rights Clearing House. In this first post of our two-part series, we will take a look at some of these  challenges that are unique to higher education.

In a changing digital world, here's how to keep student data safe

*Disclaimer: This article originally appeared in eSchool News

As the higher education landscape evolves, the community college system is growing in importance. For example, it is now commonplace for community college campuses, such as Houston Community College (HCC) and California Community College System, to serve as physical locations for associated state university classes. With this partnership in place, state universities can increase revenue and serve a broader student population, working to educate students who previously would not have been able to attend university classes.

 

Are you using an identity and access management (IAM) solution designed for the enterprise to manage user identities and access privileges at your community college or university? If so, then you’ve likely already run into some serious difficulties—and if you haven’t yet, it’s only a matter of time. An increasingly complex IT environment and growing number of users that require access to systems and data have made user identity and permissions management more challenging than ever, particularly in higher-education institutions.

When Dustin Hardin became the Director of Technology for New Caney Independent School District in 2011, the district didn't have WiFi or student accounts and only had basic email for staff. However, district leadership had ambitious goals: to implement 21st century teaching methodologies in the form of digitized learning and ongoing student-teacher engagement. To get there, New Caney ISD created a program called 1:Vision, with the goal of issuing a laptop to each student in grades 3-12.