Saturday, March 22, 2014

Duh! Learning Centers Are Learning That Students & Faculty’s Social Security #’s & Personal Data Are More Important Than Their Minds…

Duh!  Learning Centers Are Learning That Students & Faculty’s Social Security #’s & personal Data Are More Important Than Their Minds…  
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

Centers of Learning are also epicenters for the theft of personal data.

It is stated that online thieves have increasingly sought sensitive and valuable data from educational institutions. Last year, security breaches included possible exposure of over 2.5 million Social Security and bank account numbers associated with an Arizona community college system, 74,000 Social Security numbers of University of Delaware students and staff, 145,000 applications to Virginia Tech, and hundreds of thousands of records from Indiana University.

In the two weeks between recent revelations that hackers stole data on students, alumni and faculty from the University of Maryland-College Park and the Johns Hopkins University, nearly 360,000 records were swiped in similar attacks at schools in Pennsylvania, Indiana and North Dakota, contact has been made to these educational behemoths to advise and inform of how they can stop dead in their tracks, Hackers, Phishers and Man in the Middle Brutal Attackers.  

Results, very disappointing and D grade for communication skills.

When someone who is knowledgeable reaches out to assist, albeit they are the developer of the finest patented proprietary end to end data in motion security and you ignore and fail to even return the telephone call, would you send your child to such a place of learning?  

Isn't about having an open mind and absorb all you can from those that know more than you?

Colleges and universities are attractive targets for hackers because there are many access points into their networks, especially Hotspots, which contain not just financial and personal data but also valuable intellectual property. That threat is forcing academics to reassess the way they keep and protect vast collections of information, often held in decentralized computer networks accessible to thousands of students, professors and researchers.

All that they do for everyone to enter their networks is to issue a PASSWORD!  

There lies the problem!  A password is typed in, that then lets the individual enter the treasure trove of information. 

Who is it typing the password?  

Is it the owner or the cyber terrorist?  The system has no earthly idea! Then they merrily go about their sordid trade of thievery, causing havoc for those that will now suffer through the theft of information.

Since January 2013, more than 50 colleges, universities and school systems across the country have been the targets of attacks that may have compromised personal information, according to the Privacy Rights Clearinghouse, a California-based consumer-advocacy group.

"It's been a long-standing concern that our culture of collaboration and trust kind of flies in the face of the need for security to be more closed, more alert and more skeptical and cynical," said Rodney Petersen, senior policy adviser for SecuriCORE, a higher-education information security project at Indiana University. Just as campuses have added gates, guards and surveillance cameras on in recent decades, they may have to end the era of open access to online resources, he said.

The University of Maryland and other institutions reeling from major data thefts are redoubling efforts to confine and protect sensitive data spread across networks - sometimes so scattered that it's a complicated task simply to learn where the data might be hiding and vulnerable. The growing security risks may also require new barriers around networks that have been traditionally open in the name of academic discourse and unfettered access.
But unlike retailers, banks and other companies that guard sensitive data, universities can't mandate what devices or software are used to access their networks. And they must accommodate students and researchers spread across the globe, making it more difficult to prevent and detect security breaches.

Bring Your Own Device (BYOD) is not really the issue.  

It is understanding BYOD is NOT an ISSUE!

KEYTALK has resolved this for over twenty years and has been protecting governments and enterprise in Europe against such issues.

Since a breach compromised names, Social Security numbers and birth dates of 287,580 students, faculty and staff at the University of Maryland on Feb. 18, officials said they have purged more than three-fourths of the sensitive records, some of which dated back to 1992. But they are also hastening to learn how vulnerable the university's data remains, and how to prevent future attacks.

A cyber-security task force that university President Wallace Loh called together within 24 hours of the attack is set to consider whether information technology systems on campus should be centralized to keep sensitive data in one place, rather than scattered across various colleges and departments. The group, which met for the first time last week, also is launching an effort to scan all university databases for personal information that could be at risk.
Similar actions have taken place at Johns Hopkins, where officials on March 6 announced an attack that occurred late last year compromising names and email addresses of 848 bio-medical engineering students, as well as confidential evaluations of classmates. In response to attacks and at the urging of auditors, the university has moved to prioritize what data needs the highest levels of protection, said Darren Lacey, the university's chief information security officer.

It is not about where you store the information, it is about how you allow access.

There is an even simpler method which is more cost effective, virtually zero management and productive, KEYTALK!

Understand, that by using your log-in human credentials, (password), you are the total opposite of being secure! Your data, transactions and or your Identity is at major risk to be stolen by hackers, phishers and man in the middle brutal attackers.

KEYTALK, not only it secures the connection end to end but KEYTALK also distributes short lived device DNA related keys for access. DNA is pulled out the device based on a combination of 12 to 17 device components.

This means you are hidden in the KEYTALK bullet resistant end to end data in motion tube, totally anonymous to all!  This works to a major advantage, especially in the education campus environment.  The device is their secure connection and once the transaction of information is finished, there is nothing on the device to even show there was a connection.

We ask you to become more educated and take a leaf out of the Book of Learning, research, call and let us explain in simple terms on how and why KEYTALK is the Answer.  This will give you A+ grade to all, including the parents who fund your establishments.


WE are in the NOW and
KEEP YOU; in the KNOW…



Worldwide Call: +1 (317) 426.0110


Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key Talking… KEYTALK!

Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014