A New Frontier in Security

IT's job is to find security strategies that enable mobile and social apps.

For more than a quarter-million students each year at the Los Angeles Community College District, mobile devices and social software are critical tools for success. That's because these are often students' best and sometimes only ways to connect with peers, instructors, and education resources. In a recent interview, CT asked LACCD CIO Jorge Mata to discuss how institutions need to adapt their security strategies to encompass--and embrace--these tools.

Campus Technology: What is the impact of social software and mobile technology at LACCD?

Jorge Mata: Social media and mobility represent incredible promise at LACCD and in higher education in general. It is about going where the students are: The customers are there, and that's where you want to have your message. You want to join the dialogue, because the big conversation that uses these tools is going on 24/7, and it's going in every direction.

CT: What are the usual expectations about security relating to mobile and social media?

Mata: I think there is a tendency on the part of some administrators, once issues of security are brought up, to try to stop the conversation--it's often the first reaction. But as I always tell my boss, "If you only want me to tell you to stop, you are paying me way too much." IT departments and professionals should be in the business of how: How do we leverage social software and mobility? How do we make it safe? How do we allow the right things to happen?

A lot of older security technology has been very black and white--either "yes, you can do it," or "no, you can't." But the amount of content is so overwhelming now, that the minute you say no to one thing, you create a detrimental effect on another. For example, your institution may have a course on social media that actually teaches and requires the use of social software tools that you might have blocked in another context. You can't take a draconian approach in higher education. To me, blocking is a manifestation of failure--a sign that I've not been able to do my job. Again, I'm really in the business of how, and that's where I should put my efforts.

CT: Are social software and mobility dramatically changing the way you approach security?

Mata: Absolutely. In the past, user interactions were siloed, as in one person talking with a particular application. With newer, mobile technology and social media, you are suddenly looking at thousands of conversations that are happening simultaneously. This is overwhelming to traditional security, to legacy tools. We need to use security tools that are appropriate for this new environment, tools that will let you find that one element within thousands of concurrent sessions that may be an attack--find it and then surgically remove it.

That's what's new in security strategy: technology and security professionals looking more at the behavior and dynamic nature of interactions. This is not something that we did in the past. If you have chosen to stick to your traditional tools, you are already in trouble. Instead, you now need to use leading-edge security technologies--tools that can be driven by policy, that recognize identity, that work with mobile and social applications and their subcomponents in ways that let you apply business rules. You can't just block applications anymore. Applications tied to a specific port that you can turn off are a thing of the past. You have to understand how to enable applications safely. We will all be going in that direction. It's just a matter of time.

About the Author

Mary Grush is Editor and Conference Program Director, Campus Technology.

Featured

  • young man in a denim jacket scans his phone at a card reader outside a modern glass building

    Colleges Roll Out Mobile Credential Technology

    Allegion US has announced a partnership with Florida Institute of Technology (FIT) and Denison College, in conjunction with Transact + CBORD, to install mobile credential technologies campuswide. Implementing Mobile Student ID into Apple Wallet and Google Wallet will allow students access to campus facilities, amenities, and residence halls using just their phones.

  • lightbulb

    Call for Speakers Now Open for Tech Tactics in Education: Overcoming Roadblocks to Innovation

    The annual virtual conference from the producers of Campus Technology and THE Journal will return on September 25, 2025, with a focus on emerging trends in cybersecurity, data privacy, AI implementation, IT leadership, building resilience, and more.

  • illustration of a football stadium with helmet on the left and laptop with ed tech icons on the right

    The 2025 NFL Draft and Ed Tech Selection: A Strategic Parallel

    In the fast-evolving landscape of collegiate football, the NFL, and higher education, one might not immediately draw connections between the 2025 NFL Draft and the selection of proper educational technology for a college campus. However, upon closer examination, both processes share striking similarities: a rigorous assessment of needs, long-term strategic impact, talent or tool evaluation, financial considerations, and adaptability to a dynamic future.

  • DeepSeek on AWS

    AWS Offers DeepSeek-R1 as Fully Managed Serverless Model, Recommends Guardrails

    Amazon Web Services (AWS) has announced the availability of DeepSeek-R1 as a fully managed serverless AI model, enabling developers to build and deploy it without having to manage the underlying infrastructure.