Implementation of Cyber Security Practices
All students, regardless of location or modality of instruction, have access to scheduled and ad-hoc technology training provided by University IT, including one-on-one and group-based training. Self-paced training programs and modules are available around the clock through online resources. Individualized and group-based student training and support is provided for instructional systems such as the Desire2Learn learning management system, Echo360 lecture-capture system, WebEx web conferencing, synchronous video conferencing, classroom audiovisual technologies, online and high-stakes exam systems, Turning Technologies audience response system, student-owned laptop programs, simulation systems, academic computing, and a host of other instructional technologies.
At the start of each academic year, IT participates in student orientations to introduce students to instructional technologies and support services so that they can use the technologies available to them in their courses. Students are provided documentation that outlines the minimum requirements for laptops and technology for each college. IT creates tutorials, reference materials, and training sessions that target the learning needs of students. The Security Awareness Training Plan explains how employees receive overall security awareness training and provides a look at efforts set forth by the Information Security Team. Listed below are three areas highlighted from the Security Awareness Program.
Institutional Cyber Security/Information Security Officer
Walter Ray, an information technology professional with more than 15 years of experience, is the Chief Information Security Officer for the Augusta University enterprise in Augusta, Georgia.
Annual training is provided to students new to the Augusta University enterprise. Training consists of a 30 minute, multi‐slide PowerPoint presentation conducted in a group setting, facilitated by an Information Security team member. New students receive training on topics related to security awareness and are informed of their roles and responsibilities in maintaining organizational information security standards.
Annual Based Computer based Training (CBT)
Computer based training (CBT) is the foundation of the Security Awareness Program. The CBT is designed to provide employees, faculty and students with the information that they need to know to better protect enterprise information assets. Each year in November, all faculty and staff are required to complete the training. Training consists of a 15 minute online interactive security awareness module with an embedded video to support the training. Upon completion of the module, the user is required to complete an online assessment and must achieve a passing score of 80% or better.
Institutional policies are available to all faculty and staff via a policy library on the University website. The Informational Technology policies can be accessed from the (policies website) and are listed below:
|Acceptable Use of Information Technology||Data Management and Classification|
|Electronic Data Storage Backup||Information Technology Configuration Standards|
|Mobile Device Policy||Password Protection|
Security Awareness Online Reminders
The information security office submits monthly “Security Reminders” by way of the Jagwire, the university’s news and information resource. The monthly submissions are short articles pertaining to different security awareness topics, which are sent enterprise wide, to all university faculty and staff. The Security Awareness Program Manager saves a copy of all submissions in a secure folder for reference and historical purposes.