See UD's plans to return to teaching, learning, research and experiential learning on campus this fall with measures in place to promote safety and lessen the risk of COVID-19 spread.

Skip to main content

Cybersecurity

Cultivating Cybermindfulness

Consumer data breaches regularly grab headlines as personal information becomes public with increasing frequency. But cybersecurity threats are not limited to major corporations; colleges and universities are also at risk because of the sensitive data their information technology (IT) systems house.

For the third year in a row, information security was the top issue in the EDUCAUSE top 10 IT issues list. But the challenge is not simply in identifying the issues presented by information security; it's determining the best way to proactively manage them.

The University of Dayton has taken a three-prong approach to the issue of cybersecurity, focusing on awareness and training, academics and research, and partnerships.

Our Approach to Cybersecurity

Vital Cybersecurity Practices for Organizations

Provided by Rusty Baldwin and David Salisbury, Center for Cybersecurity & Data Intelligence

  • Follow the three ‘Es’ in managing cybersecurity: engineer the best solutions possible, educate to fill in gaps and utilize enforcement as a last resort if the first two fail.
  • Think deeply about the kind of data you are processing, where it lives, who has access to it, and what could happen if it were compromised.
  • Keep software and anti-virus up to date with patches and new virus definitions.
  • Set up computers with as few privileges as possible. For example, not every user needs administrator access on their machine.
  • Transform your employees into allies who understand they are “front-line” troops in the cybersecurity fight. Encourage them to report anything that seems suspicious or odd — and educate them to be mindful and situationally aware about cyber issues.
  • Keep in mind that your workforce is human and will make mistakes. Plan ahead and be prepared to handle issues that may arise.
Building a Community of Cybersecurity Allies

The University presented a global webinar on cybersecurity in conjunction with The Center for Global Enterprise’s Global Scholars program. It covered the foundations for Cyber-Mindfulness, tactics for implementing a Cyber-Mindfulness campaign and lessons learned in transforming the University of Dayton community from a source of risk to a proactive auxiliary cybersecurity force. The one-hour session was attended by 137 participants from 14 countries.

Building a Community of Cybersecurity Allies

The University presented a global webinar on cybersecurity in conjunction with The Center for Global Enterprise’s Global Scholars program. It covered the foundations for Cyber-Mindfulness, tactics for implementing a Cyber-Mindfulness campaign and lessons learned in transforming the University of Dayton community from a source of risk to a proactive auxiliary cybersecurity force. The one-hour session was attended by 137 participants from 14 countries.

How to Protect Your Data Online

Your online information has probably already been hacked, but there are simple, easy steps you can take to better protect your personal accounts. In this 90-Second Lecture, Dave Salisbury, director of the University of Dayton Center for Cybersecurity & Data Intelligence, provides tips for protecting your data.

How to Protect Your Data Online

Your online information has probably already been hacked, but there are simple, easy steps you can take to better protect your personal accounts. In this 90-Second Lecture, Dave Salisbury, director of the University of Dayton Center for Cybersecurity & Data Intelligence, provides tips for protecting your data.

Cybersecurity Articles