Brief
Quick Read
“In Kelsey’s case, she picked up work from several vacancies and many people around campus have noticed,” Sine said.
“This has been [a] monthly honor for many years,” Sine said, adding that it was put on pause for awhile before returning this year.
While there is not a set rubric for determining who earns this honor, Sine said that the primary consideration was whether or not the nominee went “above and beyond” in their position.
According to Sine, Miller was nominated by several members of the admissions staff.
”
According to Sine, Kelsey was chosen to be honored in this way because of the several nominations submitted on her behalf, particularly because one of these nominations came as a collaborative effort from five staff members.
The most important thing a staff member can do, according to Sine, is represent the best of us in their work and their character.
One of these nominations defined Miller as “the glue that has held [the admissions] department together these last few months [because they] were down five admissions counselors.
The Original Article can be found on
blog.washcoll.edu
CISA Orders Federal Agencies to Regularly Track Network Assets and Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Binding Operational Directive (BOD) that directs federal agencies in the country to keep track of …

BEC Scammer Gets 25-Year Jail Sentence for Stealing Over $9.5 Million
A 46-year-old man in the U.S. has been sentenced to 25 years in prison after being found guilty of laundering over $9.5 million accrued by carrying out cyber-enabled financial frau …

Five Steps to Mitigate the Risk of Credential Exposure
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for ac …

Back to Basics: Cybersecurity's Weakest Link
A big promise with a big appeal. You hear that a lot in the world of cybersecurity, where you're often promised a fast, simple fix that will take care of all your cybersecurity nee …

Researchers Uncover Covert Attack Campaign Targeting Military Contractors
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy …
