IT Security & Policy

Mark Bruhn

Indiana’s Mark Bruhn says he’s heard nearly every song and dance about campus IT security. Check below: Is he playing your song?

Mark S. Bruhn is Indiana University’s CIO and chief IT Security and Policy officer, working in the Office of the Vice President for Information Technology, where he advises the university administration on technology deployment and usage, especially in the critical areas of policy and security. He is also associate director of the IU Center for Applied Cybersecurity Research (CACR) and chairs the CACR-sponsored annual Indiana Higher Education Cyber Security Summit (www.cacr.iu.edu). In addition to his work at IU, Bruhn is a member of the Executive Committee of the Educause/ Internet2 Task Force on Network and Systems Security, co-chairs the Task Force’s Security Awareness and Education Initiative, and is involved in various other efforts to improve IT security in higher education. In other words, if it’s about security and policy, Bruhn is there.

10 - Sensitive data: here, there, and everywhere

  • Get rid of sensitive data ASAP: not collected, not compromised.
  • If it must be collected/kept, store it on a secure, well-maintained computer.
  • Don’t store it on workstations; secure a central computer, not thousands.

9 - Before you accuse me…

  • Make everyone responsible for his own computer/account/password security.
  • Require them to ensure only appropriate people have access to their data.

8 - Communications breakdown?

  • Rethink sensitive e-mail not encrypted before it’s sent out as an open postcard.
  • Give users a method to communicate sensitive info (PGP, secure Web drop-off).
  • Require antivirus software on all workstations, servers, e-mail relays—anywhere e-mail and documents are handled.

7 - Just what I needed!

  • Help your organization realize: Security is a cost of doing business.
  • Recognize that poor management of systems (i.e., configuration errors or lack of maintenance) accounts for most security breaches.
  • Make sure techs are given adequate resources to manage and secure IT systems.

6 - The “seeker”

  • Remember: Crackers use readily available automated scanners to scan entire networks daily for vulnerable systems and services.
  • Determine: If crackers are doing this, your organization’s techs should, too.
  • Remove vulnerabilities: Where they could afford privileged access to the system, a complete rebuild is critical.

5 - Set them free

  • Understand all programs running on servers.
  • Stop programs/services not truly required, to reduce vulnerability exploitation.
  • Consult security guides and documents available at vendor Web sites.

4 - Silence is golden

  • Realize: Weak passwords are still a common route to compromised computers.
  • Require strong passwords (not dictionary words!) on every computer.
  • Remind users: Passwords shouldn’t be shared with anyone, even support techs.

3 - Change the locks

  • Don’t forget physical protection of IT systems—often overlooked, but critical to IT security plans.
  • Restrict physical access to critical servers; don’t, and logical security is useless.
  • Provide adequate climate control for all critical servers.

2 - Real, real gone…

  • Remove all traces of personal and business data from storage media (e.g., hard drives) before reassigning the device.
  • Accept it: Deleting files/reformatting a hard drive d'esn’t remove stored data.
  • Techs should use wiping utilities, degaussing, or destruction to securely remove all data remnants.

1- Show me the way

  • Remember: An organization can’t begin to protect critical systems and functions without first knowing what technologies have been deployed.
  • Once technologies and their interrelationships are clear, spot associated risks.
  • Once risks related to technology are identified and prioritized, put your money where the risks are.

Featured

  • widescreen computer monitor displaying an AI-powered search engine interface with a search bar and futuristic icons

    Google, Microsoft Expand AI-Driven Search Capabilities

    Recent announcements from Google and Microsoft highlight a slough of AI capabilities for their search tools.

  • illustration of a futuristic building labeled "AI & Innovation," featuring circuit board patterns and an AI brain motif, surrounded by geometric trees and a simplified sky

    Cal Poly Pomona Launches AI and Innovation Center

    In an effort to advance AI innovation, foster community engagement, and prepare students for careers in STEM fields and business, California State Polytechnic University, Pomona has teamed up with AI, cloud, and advisory services provider Avanade to launch a new Avanade AI & Innovation Center.

  • lock with a glowing keyhole integrated with a transparent, layered server stack against a dark background with a subtle grid pattern

    Cohesity Integration Adds Protection for Red Hat OpenShift Virtualization Workloads

    AI-powered data security company Cohesity has expanded its collaboration with Red Hat to enhance data protection and cyber resilience for Red Hat OpenShift Virtualization workloads.

  • modern college building with circuit and brain motifs

    Anthropic Launches Claude for Education

    Anthropic has announced a version of its Claude AI assistant tailored for higher education institutions. Claude for Education "gives academic institutions secure, reliable AI access for their entire community," the company said, to enable colleges and universities to develop and implement AI-enabled approaches across teaching, learning, and administration.