Cyber Security In Higher Education

In response to the Coronavirus onslaught, higher education is rapidly migrating to remote and online learning and academic and IT leaders in the sector have faced an onslaught of challenges. Perhaps the greatest of these is the need for heightened cyber security, at the same time as budgets and resources are shrinking.
 
According to Bitdefender, the number of detected ransomware attacks, which paralyse victims’ systems or threaten to release confidential information until they pay a ransom, has increased by over 700% compared to the same period in 2019 and a significant trend which has emerged during the COVID-19 pandemic is an explosion in ransomware attacks on universities
 
Because higher education institutions have a low tolerance for downtime, store vast amounts of student and staff personal information, and keep valuable research data on file, they’re particularly vulnerable to this kind of cyber crime.  As thousands of students and staff now connect to educational networks remotely, COVID-19 has made breaching higher education networks even easier for threat actors. 
 
There have been around a thousand attacks a year targeting higher education institutions across the UK, often in the form of phishing and ransomware attacks that can leave staff and students open to account hacking, credential theft and credit card fraud and now the British  National Cyber Security Centre has issued a warning about the rising number of cyber-attacks against colleges and universities. It can take months or even years to recover after an attack, it is vital that higher education institutions identify where their cybersecurity risks lie and implement the right strategies to help maintain cybersecurity safeguards and protect data.
 
Strategies to Minimise Risk
 
To minimise risk and safeguard data, institutions must begin to adopt transparent strategies and policies. This includes backing up data and keeping it offline at certain points on a regular basis and monitoring network traffic and managing access controls. Additionally, with many thousands of staff and students to protect, active two-factor authentication should be considered to give every network user an extra element of security.
 
Higher education institutions must also plan for solutions in the event of a security breach and consider the possibility of shutting down an entire network or system for a period if needed. This potential plan will enable actions to respond to an attack and identify the infection point and reset and analyse the infrastructure allowing the institution to get back up and running safely. It will also allow the time to change passwords, update credentials and restore data as necessary as well as notify authorities of the breach as necessary to comply with data protection and security regulations.
 
Processing Data Securely
 
As universities and colleges process significant volumes of personal data, the sector must address how to do this securely and in a way that complies with the General Data Protection Regulation (GDPR). The most effective way is to establish governance for the protection of personal data, which starts with appointing a Data Protection Officer who will be responsible for ensuring that the institution maintains compliance and enforces and communicates a clear GDPR strategy across the community of the institution. 
 
As institutions are data controllers of student data, they must work with their technology partners to implement the right data platforms securely and safely to store and transmit both student data and other resources. The most effective solutions will be those with security based on authentication, authorisation, auditing and encryption. The authentication capabilities will allow the institution to verify the identity of all users, while authorisation ensures that users can access the resources that they need, and no others.
 
Such a solution should also be paired with tried and tested cyber security strategies through defining and putting into effect how an institution identifies, protects, detects, responds and recovers from cybersecurity events and incidents.
 
Key Issues For British Universities & Colleges
 
The key cyber threats to UK universities are most likely to be:
 
• Criminals seeking financial gain
• Nation states looking to steal personal data and intellectual property, for strategic advantage
 
Cyber crime will probably present the most evident and disruptive difficulties for universities. However, State-sponsored espionage is likely cause greater long-term damage. Likely effects of state espionage include:
 
• Damage to the value of research, notably in STEM subjects
• A fall in investment by public or private sector in affected universities
• Damage to the UK’s knowledge advantage  
 
In both culture and technology, universities are one of the most open and outward facing sectors. This enables and eases collaboration between academics across borders, unfortunately, this also eases the task of an attacker.
 
Cyber crime too will almost certainly continue to impact universities, either as a direct target or as collateral, regardless of the reputation and success of those universities targeted. If foreign direct investment were to come under greater scrutiny or restriction, it is a realistic possibility that the cyber threat to universities would increase, as nation states sought alternative ways to gain access to sensitive research and intellectual property.
 
While the methods employed by cyber criminals are constantly evolving, spear-phishing and ransomware are highly likely to remain the main attack vectors. Ransomware is likely to be the greatest single cause of disruption to staff, students and the universities themselves.
 
NCSC:      Infosecurity Magazine:        EdTech Magazine:       Morphisec:       Image: Unsplash
 
You Might Also Read: 
 
British Universities Shut Down By Cyber Attacks:
 
« How To Create Effective Cyber Security Training For Employees
Instagram, TikTok & Twitter Shutdown Stolen Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

HWG

HWG

HWG is a company specialized in providing cyber security solutions and consulting services.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.