IT Security & Policy

Mark Bruhn

Indiana’s Mark Bruhn says he’s heard nearly every song and dance about campus IT security. Check below: Is he playing your song?

Mark S. Bruhn is Indiana University’s CIO and chief IT Security and Policy officer, working in the Office of the Vice President for Information Technology, where he advises the university administration on technology deployment and usage, especially in the critical areas of policy and security. He is also associate director of the IU Center for Applied Cybersecurity Research (CACR) and chairs the CACR-sponsored annual Indiana Higher Education Cyber Security Summit (www.cacr.iu.edu). In addition to his work at IU, Bruhn is a member of the Executive Committee of the Educause/ Internet2 Task Force on Network and Systems Security, co-chairs the Task Force’s Security Awareness and Education Initiative, and is involved in various other efforts to improve IT security in higher education. In other words, if it’s about security and policy, Bruhn is there.

10 - Sensitive data: here, there, and everywhere

  • Get rid of sensitive data ASAP: not collected, not compromised.
  • If it must be collected/kept, store it on a secure, well-maintained computer.
  • Don’t store it on workstations; secure a central computer, not thousands.

9 - Before you accuse me…

  • Make everyone responsible for his own computer/account/password security.
  • Require them to ensure only appropriate people have access to their data.

8 - Communications breakdown?

  • Rethink sensitive e-mail not encrypted before it’s sent out as an open postcard.
  • Give users a method to communicate sensitive info (PGP, secure Web drop-off).
  • Require antivirus software on all workstations, servers, e-mail relays—anywhere e-mail and documents are handled.

7 - Just what I needed!

  • Help your organization realize: Security is a cost of doing business.
  • Recognize that poor management of systems (i.e., configuration errors or lack of maintenance) accounts for most security breaches.
  • Make sure techs are given adequate resources to manage and secure IT systems.

6 - The “seeker”

  • Remember: Crackers use readily available automated scanners to scan entire networks daily for vulnerable systems and services.
  • Determine: If crackers are doing this, your organization’s techs should, too.
  • Remove vulnerabilities: Where they could afford privileged access to the system, a complete rebuild is critical.

5 - Set them free

  • Understand all programs running on servers.
  • Stop programs/services not truly required, to reduce vulnerability exploitation.
  • Consult security guides and documents available at vendor Web sites.

4 - Silence is golden

  • Realize: Weak passwords are still a common route to compromised computers.
  • Require strong passwords (not dictionary words!) on every computer.
  • Remind users: Passwords shouldn’t be shared with anyone, even support techs.

3 - Change the locks

  • Don’t forget physical protection of IT systems—often overlooked, but critical to IT security plans.
  • Restrict physical access to critical servers; don’t, and logical security is useless.
  • Provide adequate climate control for all critical servers.

2 - Real, real gone…

  • Remove all traces of personal and business data from storage media (e.g., hard drives) before reassigning the device.
  • Accept it: Deleting files/reformatting a hard drive d'esn’t remove stored data.
  • Techs should use wiping utilities, degaussing, or destruction to securely remove all data remnants.

1- Show me the way

  • Remember: An organization can’t begin to protect critical systems and functions without first knowing what technologies have been deployed.
  • Once technologies and their interrelationships are clear, spot associated risks.
  • Once risks related to technology are identified and prioritized, put your money where the risks are.

Featured

  • college students in a classroom focus on a silver laptop, with a neural network diagram on the monitor in the background

    Report: 93% of Students Believe Gen AI Training Belongs in Degree Programs

    The vast majority of today's college students — 93% — believe generative AI training should be included in degree programs, according to a recent Coursera report. What's more, 86% of students consider gen AI the most crucial technical skill for career preparation, prioritizing it above in-demand skills such as data strategy and software development.

  • university building with classical architecture is partially overlaid by a glowing digital brain graphic

    NSF Invests $100 Million in National AI Research Institutes

    The National Science Foundation has announced a $100 million investment in National Artificial Intelligence Research Institutes, part of a broader White House strategy to maintain American leadership as competition with China intensifies.

  • cybersecurity book with a shield and padlock

    NIST Proposes New Cybersecurity Guidelines for AI Systems

    The National Institute of Standards and Technology has unveiled plans to issue a new set of cybersecurity guidelines aimed at safeguarding artificial intelligence systems, citing rising concerns over risks tied to generative models, predictive analytics, and autonomous agents.

  • school building connected by lines to symbols of AI, data charts, and a funding document with a dollar sign

    ED Issues Guidance on the Use of Federal Grant Funds to Support Learner Outcomes with AI

    In response to President Trump's April 23 Executive Order on advancing AI education, the United States Department of Education has issued new guidance on how K-12 and higher education institutions may use federal grant funds "to support improved outcomes for learners through the responsible integration of artificial intelligence."