Cisco
Campus Technology

Baseball and security -- there’s something about these two topics that makes sense. Perhaps it’s the execution of the strategy; or perhaps it’s the finality of a well-executed play. But there are some indisputable truths about both the sport and the need for IT security in schools and universities. In the midst of the blissful summer rituals, dangers are still lurking. Malware and ransomware are trying to steal dollars you have set aside for the next wave of innovation in education. So this summer, when the bad guys think you are only worried about the next ballgame, set in motion your Triple Play against malware, ransomware, and threats from the cloud. With our special Cisco Capital solutions, your organization can still afford to implement before the fall rush of students. Knock it out of the park now for your students!

Trivia Challenge

And while Security is no Trivial Matter, please join us in our Baseball and Security Trivia Challenge. This is a fun way to learn about a serious subject. Follow us here on twitter and on Facebook. #CiscoTriplePlay.

Security/Baseball Challenge Answers

  • T or F: 27% percent of connected third-party cloud apps introduced into enterprise environments in 2016 posed a high security risk.
    TRUE
  • T or F: Barry Bonds has played the most consecutive games of baseball, breaking Lou Gehrig's record on September 6, 1995.
    FALSE, Cal Ripken, Jr.
  • T or F: In 2016 the number of new cloud applications introduced actually slowed.
    FALSE
  • T or F: The first designated hitter's initials were DH (Dan Hayes).
    FALSE
  • T or F:Security teams use automation to cut through the “noise” of security alerts and focus their resources on investigating true threats
    TRUE
  • T or F: Security teams use automation to cut through the “noise” of security alerts and focus their resources on investigating true threats.
    TRUE

Check back next week for more answers! #CiscoTriplePlay

Resources

  • 2017 Annual Risk Security Report

    The Cisco 2017 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research. The research team highlights the relentless push-and-pull dynamic between adversaries trying to gain more time to operate and defenders working to close the windows of opportunity that attackers try to exploit.

  • Cisco Advanced Malware Protection for Endpoints

    Hackers are creating advanced malware that can evade even the best prevention tools, like antivirus and intrusion prevention systems. This leaves IT security teams blind to the scope of a potential compromise and unable to quickly detect and remediate malware before it causes damage.

  • It's Tuesday, Carl

    Cisco’s CloudLock Cloud Access Security Broker (CASB) solution protects your cloud users, secures your cloud data, and defends your cloud apps.

  • Special Security Finance Offer

    Avoid technology obsolescence with flexible migration options and gain access to a widevariety of Cisco solutions across architectures using Cisco Easy Pay.

  • Ransomware Defense for Dummies eBook

    Ransomware Defense For Dummies consists of five short chapters that explore how ransomware operates and its defining characteristics, security best practices to reduce ransomware risks, a “new best-of-breed” security architecture, the Cisco Ransomware Defense solution, and important ransomware defense takeaways.

  • SUNY glass pilot The Rise of the Secure Internet Gateway

    The IT landscape has evolved. Critical infrastructure, applications, and data are moving to the cloud, leveraging either public or private cloud infrastructure. Salesforce.com, Box, G Suite, Office 365, and other software-as-a-service (SaaS) apps, whether sanctioned by IT or not, are commonplace in companies of all sizes and industries — even the most highly regulated ones.

  • Don't Risk IT Infographic

    Jack Is sad. Zach Is Smart. Find Out Why. Don't Risk IT!

  • Umbrella Customer Experience: George Washington University

    Mike Glyer, Director of Information Security Services, explains how George Washington University uses OpenDNS to protect intellectual property and reputation.