Marjorie Spivak, Taylor Ey, and Liz LeVan Riley of Womble Bond Dickinson (US) LLP write:
Consider these five steps during your summer break to address the protection of confidential information and combat cybersecurity risks before the start of fall semester.
1. Information Assessment: Identify what data your institution holds, how it is used, how is it protected, and who has access
[…]
2. Asset Assessment: Routinely assess network devices, systems and software platforms within the institution to ensure technical solutions; monitor for suspicious activity; and identify organizational solutions that minimize risk
Read more on The National Law Review.