Cyber Security In Higher Education

In response to the Coronavirus onslaught, higher education is rapidly migrating to remote and online learning and academic and IT leaders in the sector have faced an onslaught of challenges. Perhaps the greatest of these is the need for heightened cyber security, at the same time as budgets and resources are shrinking.
 
According to Bitdefender, the number of detected ransomware attacks, which paralyse victims’ systems or threaten to release confidential information until they pay a ransom, has increased by over 700% compared to the same period in 2019 and a significant trend which has emerged during the COVID-19 pandemic is an explosion in ransomware attacks on universities
 
Because higher education institutions have a low tolerance for downtime, store vast amounts of student and staff personal information, and keep valuable research data on file, they’re particularly vulnerable to this kind of cyber crime.  As thousands of students and staff now connect to educational networks remotely, COVID-19 has made breaching higher education networks even easier for threat actors. 
 
There have been around a thousand attacks a year targeting higher education institutions across the UK, often in the form of phishing and ransomware attacks that can leave staff and students open to account hacking, credential theft and credit card fraud and now the British  National Cyber Security Centre has issued a warning about the rising number of cyber-attacks against colleges and universities. It can take months or even years to recover after an attack, it is vital that higher education institutions identify where their cybersecurity risks lie and implement the right strategies to help maintain cybersecurity safeguards and protect data.
 
Strategies to Minimise Risk
 
To minimise risk and safeguard data, institutions must begin to adopt transparent strategies and policies. This includes backing up data and keeping it offline at certain points on a regular basis and monitoring network traffic and managing access controls. Additionally, with many thousands of staff and students to protect, active two-factor authentication should be considered to give every network user an extra element of security.
 
Higher education institutions must also plan for solutions in the event of a security breach and consider the possibility of shutting down an entire network or system for a period if needed. This potential plan will enable actions to respond to an attack and identify the infection point and reset and analyse the infrastructure allowing the institution to get back up and running safely. It will also allow the time to change passwords, update credentials and restore data as necessary as well as notify authorities of the breach as necessary to comply with data protection and security regulations.
 
Processing Data Securely
 
As universities and colleges process significant volumes of personal data, the sector must address how to do this securely and in a way that complies with the General Data Protection Regulation (GDPR). The most effective way is to establish governance for the protection of personal data, which starts with appointing a Data Protection Officer who will be responsible for ensuring that the institution maintains compliance and enforces and communicates a clear GDPR strategy across the community of the institution. 
 
As institutions are data controllers of student data, they must work with their technology partners to implement the right data platforms securely and safely to store and transmit both student data and other resources. The most effective solutions will be those with security based on authentication, authorisation, auditing and encryption. The authentication capabilities will allow the institution to verify the identity of all users, while authorisation ensures that users can access the resources that they need, and no others.
 
Such a solution should also be paired with tried and tested cyber security strategies through defining and putting into effect how an institution identifies, protects, detects, responds and recovers from cybersecurity events and incidents.
 
Key Issues For British Universities & Colleges
 
The key cyber threats to UK universities are most likely to be:
 
• Criminals seeking financial gain
• Nation states looking to steal personal data and intellectual property, for strategic advantage
 
Cyber crime will probably present the most evident and disruptive difficulties for universities. However, State-sponsored espionage is likely cause greater long-term damage. Likely effects of state espionage include:
 
• Damage to the value of research, notably in STEM subjects
• A fall in investment by public or private sector in affected universities
• Damage to the UK’s knowledge advantage  
 
In both culture and technology, universities are one of the most open and outward facing sectors. This enables and eases collaboration between academics across borders, unfortunately, this also eases the task of an attacker.
 
Cyber crime too will almost certainly continue to impact universities, either as a direct target or as collateral, regardless of the reputation and success of those universities targeted. If foreign direct investment were to come under greater scrutiny or restriction, it is a realistic possibility that the cyber threat to universities would increase, as nation states sought alternative ways to gain access to sensitive research and intellectual property.
 
While the methods employed by cyber criminals are constantly evolving, spear-phishing and ransomware are highly likely to remain the main attack vectors. Ransomware is likely to be the greatest single cause of disruption to staff, students and the universities themselves.
 
NCSC:      Infosecurity Magazine:        EdTech Magazine:       Morphisec:       Image: Unsplash
 
You Might Also Read: 
 
British Universities Shut Down By Cyber Attacks:
 
« How To Create Effective Cyber Security Training For Employees
Instagram, TikTok & Twitter Shutdown Stolen Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.