Effective Cybersecurity is Accessible; Effective Digital Accessibility is Secure
Posted Date: October 1, 2023
Essential Update Rundown
Remember, updates are not optional. Their most common components are critical to keeping technology safe, healthy, and performing as designed.
Technology updates are frequently referred to as "patching" and allow your technology to improve in the following ways:
Security: Block and mitigate damage from cyber threats being introduced daily, ranging from malware to data theft.
Accessibility: Enhance or add accessibility features for both individual and managed devices.
Maintenance: Prepare technology to continue performing well in shifting environments, such as keeping operating systems compatible with changes to cellular networks.
Performance Improvement: Correct design coding glitches or "bugs" that cause dysfunction and add newly developed or enhanced features and options.
October is National Cybersecurity Awareness Month and National Disability Employment Awareness Month. Now is the ideal time for users to familiarize themselves with the tools and support Northwestern IT provides to keep cybersecurity and digital accessibility aligned and top of mind. While the topics may seem disparate, the best way to protect against cyber threats and create a more inclusive and accessible community is to remain aware and proactive.
There are a number of evergreen and accessible steps users can take to shield themselves, including:
- Using multi-factor authentication (MFA)
- Keeping devices, software, and cloud-based applications up to date
- Learning how to recognize and report all kinds of phishing
- Using strong passwords
Read on to review details about simple ways to stay safer online and for information on how artificial intelligence impacts both cybersecurity and digital accessibility.
Two is Better Than One
Whether you have heard it referred to as MFA or two-step authentication, using an additional identity verification method beyond entering a user name and password is one of the best ways to protect your privacy and data. Duo is designed with accessibility in mind, offering multiple tools, including screen readers, magnifiers, and various color contrast lenses.
Updates Are Essential
Nearly all technology available today—including your laptop, smartphone, and browser—receive software updates from their manufacturers. Updates sometimes contain new and exciting features, including accessibility improvements, but most contain fixes for critical security flaws used to infiltrate systems and smuggle data. In 2022, more than 25,000 such flaws were found in software and hardware; most were fixable with software updates or upgrades.
Manufacturers focus on the most current versions of their products, so running supported software and hardware allows users to receive security patches and accessibility enhancements as they become available. Updates sometimes happen automatically, but often, they require a user to accept the update or restart their device for the patches to take effect. Review the "Essential Update Rundown" on the right side of this page to learn more about different update types and how they improve your technology.
Check It Before You Click It
Phishing, or its text message and video counterparts "smishing" and "vishing," remain among the most pervasive threats to the Northwestern community. Phishing messages can make it to our inboxes, even after various layers of email defense quarantine nearly three million messages per day. Phishing attacks are not always about compromising credentials or other sensitive data; they are often a gateway for other financial crimes.
Northwestern IT provides tips and resources to help users identify and avoid phishing. Below are a few to consider:
Robust Passwords Protect You Better
A strong password is the first line of defense in digital privacy and data protection. Passwords need to be sufficiently complex to be effective. However, that does not mean passwords must be so complicated that they lock out those they intend to protect.
Take It Easy
Keep It to Yourself
Even the strongest passwords will only protect you as well as you protect them. Keep your passwords safe—NEVER share them with others.
Artificial Intelligence Needs Genuine Attention
Generative AI tools, such as ChatGPT, Bard, and DALL-E, are evolving quickly and becoming pervasive in the technology industry. This rapid change is ushering in novel challenges and new possibilities for cybersecurity and digital accessibility.
Pros | AI technologies, including machine learning, natural language processing, and computer vision tools can be leveraged to enhance accessibility by expanding users' possibilities to customize how they engage with digital content. Similarly, AI-based endpoint security solutions using machine learning algorithms can scan files and evaluate device behavior to identify malware and other threats better than ever before. |
---|---|
Cons | If the necessary considerations around inclusivity are not part of developers' processes, AI can complicate and introduce new accessibility barriers. The ways AI can be manipulated to bolster the reach and impact of cyber threats are evident and expanding. |
Recommendations | There is no singular way to contemplate how AI's future will impact human interaction with digital technology. As we all continue to learn more, Northwestern asks that all members of the University community conduct teaching, learning, research, and business following the University's Guidance on the Use of Generative AI. Northwestern has compiled specific instructor resources and other information concerning AI on the University's Artificial Intelligence website. |
Final Takeaway
Digital accessibility and cybersecurity share the common goal of inclusivity. Both aim to guarantee equitable and safe usage of the tools and resources that technology affords without barriers, the threat of harm, marginalization, or exclusion. Actualizing that guarantee requires both individual and collective action. Please follow the insights shared in this article and join Northwestern IT in working to keep us all safer. For additional information and resources on these topics, you can visit Northwestern's digital accessibility and information security websites.