There’s no doubt that higher education institutions face unique challenges in data security. Our IT environments often reflect the open and distributed nature of our institutions, demonstrating Conway ...
Privacy violations are a serious threat to the health of the Internet and the effective use of technology. We study how people understand their privacy as users of ...
Align privacy and security objectives with business needs Embed privacy by design and default Engage stakeholders early and maintain transparency throughout the process Minimize data collection and ...
Time and again, cybersecurity professionals have struggled to navigate so-called "perfectly designed" security systems — not due to a lack of effort but to a fundamental design flaw. These systems ...
Modern organizations are a combination of people and technologies that allow them to perform their job functions as productively as possible. People, however, are not perfect and prone to making ...
The internet-of-things security crisis has been building for more than a decade, with unprotected, unpatchable gadgets fueling botnets, getting attacked for nation state surveillance, and just ...
New insights into how smart digital locks, biometric access, and connected door security systems are reshaping modern ...
Jodi Daniels is a privacy consultant and Founder/CEO of Red Clover Advisors, one of the few Women’s Business Enterprises focused on privacy. Remember how seatbelts weren’t mandatory for car ...
Security must be built into the core of any product or technological advancement during the early stages of design. Unfortunately, many software companies still treat cybersecurity as an afterthought.
We all have a role to play in protecting Harvard Business School’s (HBS’s) data and systems—and our own. Practicing good security habits is always important, especially so in times of heightened risk.