Maroon and gold graphic of a lock

Collaboration is critical for cybersecurity professionals

For over two decades, Edward Garcia has been a staple at the Sandra Day O’Connor College of Law at Arizona State University. Garcia started as a technology support analyst in 2004 and has risen to senior director of information technology services.

He considers himself a constant, yet his subject matter of cybersecurity is constantly changing.

Garcia says his goal is to maintain a secure computing environment at the law school, ensure standards and compliance and proactively address potential vulnerabilities.

“We don't want to be the weakest link in the chain,” he said. “We take a lot of pride in making sure that we're locking down our workstations, patching them quickly, leveraging the tools that are there and always sharing information with the greater ASU IT community.”

In the Q&A below, Garcia analyzes the importance of this collaborative and approach and discusses his department’s efforts to maintain a secure environment. He emphasizes the need for caution when signing up for online subscriptions and promotes the responsible and ethical use of various generative generative artificial intelligence (AI) applications.

Question: You’re in your 21st year of working at the Sandra Day O’Connor Law School at ASU. How has the cybersecurity ecosystem changed during that time?

In the past, cybersecurity was not a top priority for users or the IT industry. It was very reactive and often required the removal of spyware, malware, worms, viruses and pop-ups. However, the landscape has shifted to a more proactive approach as organizations and individuals face more serious threats like ransomware and cybercriminals attempting to steal identities for fraudulent activities. This shift is quite alarming and unsettling.

Q: For you to create the most secure environment possible at the law school, how important is collaboration with other departments across the university?

Over the past 20 years, many traditional IT professionals have chosen not to be transparent. However, transparency is crucial. I work closely with teams throughout the university, including members of ASU Enterprise Technology. It's not about concealing or controlling everything; I prioritize transparency, fostering partnerships and working together to ensure that we fulfill our responsibility to secure the university and protect our faculty, staff and students.

A lot of it comes down to partnerships and relationships with security professionals in the ASU Technology ecosystem. Having a voice and actively engaging with the community is essential for maintaining a strong security posture. Security is everyone's responsibility, regardless of their role or area of expertise. 

Q: October is National Cybersecurity Awareness Month. What is top of mind for you in the current state of cybersecurity?

I'm deeply concerned about users signing up for free online services and subscriptions without understanding what data they provide and how the company uses that data.

I make an effort to educate users about this. It's important to be mindful about what you sign up for. I encourage the use of social sign-in, so if you're signing up for something free, consider using the Google-managed sign-in with your ASU username to enforce ASU Single Sign-on and two-factor authentication. 

Q: What challenges has AI created for cybersecurity?

Lawmakers need to craft effective laws and regulations for AI to keep up with the rapid advancements. Organizations developing AI must prioritize trust and transparency and include safeguards to ensure the responsible and ethical use of AI platforms.

For example, Salesforce has recently integrated generative AI tools into its ecosystem. One of these tools is the Einstein Trust Layer, which includes features and guardrails to protect data privacy and security, improve the accuracy of AI results, and promote the responsible use of AI within the Salesforce ecosystem.

Q: What is a practical tip you’d like to share with users to keep their information secure?

If you have online accounts, make sure to enable multi-factor authentication with your mobile device or use the company's two-factor authenticator tool.

Also, a national data broker was breached in December 2023, resulting in the compromise of 2.9 billion records. Recently, my social security number was found on the dark web. As a precaution, I have frozen my credit and set up fraud alerts with each credit bureau. These steps can be completed at no cost and will help protect your credit from cybercriminals. It's important for everyone to take these simple steps now rather than waiting for their credit to be compromised and used fraudulently.