A husband and wife team took a multipronged approach to defraud their employing university. Their case is rich with examples of how to violate a university's trust. Their system worked because they were trusted employees lacking oversight.

A long-running theft at the University of Toledo shows what can happen when policies and procedures about how and where to deposit money are disregarded or not clearly defined. After looking at what happened at Toledo, we'll review ƽ policies and procedures designed to counter a similar occurrence here.

Hank and John Green have been producing YouTube videos as the Vlogbrothers since 2007. Because most of us are relatively new to the world of routine video chats and meetings, Hank shares tips for doing these well.

It's a sad fact of life that natural disasters and pandemics are perfect incubators for scammers to take advantage of the public's fear and anxiety. Rich with sensitive information, colleges and universities are an attractive target.

Pcards are a great tool when proper protocols are established and followed. This post is a cautionary tale of what can happen when an organization issues pcards without user instructions and spending guidelines.

There were numerous phishing incidents at universities across the country in the past year. The three highlighted here provide considerable insight about why hackers target colleges and universities. ƽ counters hacking attempts with several best practices.

My previous post highlighted how universities fumbled data security because of data handling errors. Data exposed in the incidents included student education records, protected health information, Social Security numbers and credit card numbers. ƽ has four policies that guard against data handling errors. Are you familiar with all four?

Ball security is essential to a football team's success. Similarly, data security is essential to a university's success because data security failures requires repurposing resources that could have been used to further the university's mission. Eight recent incidents highlight how simple data handling errors caused these universities to fumble data security.

Here we complete our examination of the University of Georgia situation where a former employee stole more than $1.3 million from its Greek Life Office over ten years. What could have helped someone notice the theft early on?

Here we continue our look at the University of Georgia situation where a former employee stole more than $1.3 million from the school's Greek Life Office over ten years. What controls could have prevented the fraud from happening?