Kimberly Peretti, Amy Mushahwar and Jon Knight
Discusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing…
Abstract
Purpose
Discusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence.
Design/Methodology/Approach
Discusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure.
Findings
The remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success.
Practical implications
The authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions.
Originality/Value
Practical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.
Details
Keywords
Following a proposal at Loughborough University that “reading lists should be made available online” the university library undertook responsibility to design and develop a system…
Abstract
Following a proposal at Loughborough University that “reading lists should be made available online” the university library undertook responsibility to design and develop a system to achieve this aim. Using open source tools the rapid development of a reading list management system soon followed, and by Autumn 2000 the solution had been successfully implemented at the university. The system is now available to other institutions as open source software.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
The Hybrid Library of the Future (HyLiFe) project was funded by the Joint Information Services Council (JISC) for higher education in the UK and it focused on the users of the…
Abstract
The Hybrid Library of the Future (HyLiFe) project was funded by the Joint Information Services Council (JISC) for higher education in the UK and it focused on the users of the hybrid library. This article outlines the user‐centred approach used in evaluating the project. While the evaluation of HyLiFe diverged from much standard practice in performance measurement, the work of researchers into performance measures for the electronic library proved invaluable to the HyLiFe evaluation officer.