A gang of criminals has invaded every corner of America. They are casing neighborhoods, trying windows, rattling door knobs, looking for any way inside to further their epidemic of lawlessness and theft.
What this band is looking to steal are people's identities. To those who fight it, this international ring of criminals is known simply as the adversary. The battleground on which they fight is not the streets, but on the computers and networks that we use every day.
“It isn’t as though there is a single weapon or a single group,” says John Rathje, vice president for Information Technology and chief information officer. “These bad actors often work in concert to identify exploits and leverage them for their cause, whatever that might be.”
While Kent State’s cybersecurity experts won’t say exactly what Kent State is doing to secure itself from cyberattacks, for fear of giving away information criminals can exploit, they do say that the university has inserted controls both on the outer perimeter of the network and on individual devices.
Read the full story to see what tips Kent State experts give to stay clear of attacks and safeguard your digital privacy in the Fall/Winter 2018-19 of the Kent State Magazine.