Network Connection Archives, 2016

Articles by Philip Baczewski, executive director, University Information Technology


October: Securing the Human

Most cybersecurity experts agree that the number one vulnerability leading to IT system and data breaches are the people who are using or have responsibility for managing those systems. It's not a coincidence that UNT's mandated employee security training is entitled "Securing the Human." As more of our business and communications occur on computer networks, it is unfortunately natural that some will attempt to gain an advantage (monetary or otherwise) by breaching those networks and the systems they connect. The easiest path is via social engineering — that is, tricking humans into divulging information that would and should normally remain private. Read more.

August: 5 Gee!
May: Fair Credit
February: Bitcoins in the News


December: It's not paranoia...
October: What's in an algorithm?
August: Live and Learn
June: Open the Pod Bay Doors
April: Rabbit Ears?
February: Oh, What a Tangled Web We Weave



Benchmarks Online Archives

Editor's Note: Please note that information in each edition of Benchmarks Online is likely to change or degrade over time, especially the links to various websites. For current information on a specific topic, search the UNT website, UNT's UIT Help Desk or the world wide web. Email your questions and comments to the UNT University Information Technology Department or call 940-565-4068.