British Universities Have Many Cyber Threats

Emerging online threats and tough new penalties for data breaches are forcing universities to take cyber security more seriously than ever.  Universities are bombarded on a daily basis with information about cybercrime and security, almost to the point where it feels that little else needs to be done other than trust in the IT department’s skills and get on with life.

But does this mean students and academic staff are safe? Is their research and partner companies’ data really secure? Will an institution’s computers, libraries and facilities function without hiccup thanks to the new wave of encryption, site blocks and alerts that have arrived in recent months?

In a word, no. Universities will never be 100 per cent secure because no one is completely safe when it comes to cybersecurity. 

As Henry Hughes, deputy chief information security officer at Jisc, pointed out at a recent higher education conference: “Half of you are not doing any student training in cyber security.” Supporting this statement, he added that a Jisc survey of 22,000 students’ satisfaction at the end of their courses found that 82 per cent felt that digital skills were essential to their future careers, but less than half of the group felt that they were well prepared for the digital workplace.

This matters because we can all be victims (or at least targets) and cyber security cannot, and should not, be delegated. While you are busy thinking “it’s not going to be me, I’m not important”, that is when you leave yourself vulnerable.
IT security is not a new challenge for universities but with the new European Union’s General Data Protection Regulation it is expected that universities will become more liable for data breaches, with fines of up to 2 per cent of overall revenue or €10 million, whichever is higher.

In 2016, the UK government set out plans to commit £1.8 billion to the National Cyber Security Strategy, working with organisations from the private sector, public agencies and academia to create a national Cyber Security Centre, a Cyber Innovation Centre, and an Institute of Coding.

The University of Gloucestershire is leading discussions with a select group of universities and businesses to discuss the shape and form of this national project. The university is also now one of 17 universities helping its graduates to develop skills in writing safe and secure software, as part of the newly set up Institute of Coding.

This project has acquired greater importance thanks to a new phenomenon known as the “internet of things”. This shorthand describes the online interconnection of computing devices embedded in everyday objects, ranging from phones and fridges to home thermostats and power stations. 

Within two years it is estimated that about 26 billion devices will be connected to the internet. Cyber-attacks will have the potential to damage not just our laptops and work computers, but dozens of electrical items in our homes. As such, university staff and students need to get into good “cyber hygiene” habits. Campus visitors bring laptops and mobile phones with them, while academics frequently connect with organisations from around the world. We need to limit the number of people with administrator privileges and be wary of disgruntled insiders.

Training and education must be continuous because cybersecurity is a process, not an event. It has to be part of a university’s ongoing risk assessment. We all should think of ourselves as human firewalls within our organisations.

It is vital to make sure that systems are updated regularly and understand that security is a continuous process. Share good practice, your neighbour could be the weak link so help them, and have a plan for when it all goes wrong.

Times Higher Education:      Image: Nick Youngson

You Might Also Read: 

Oxford University’s Cyber Research:

Canadian University Hit For $12m Phishing Scam:

 

« Business AI Platform For Commercial Development
Deloitte To Invest £430 Million On Cybersecurity Defences »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.