Universities Are Targets For Cyber Criminals

The number of cyberattacks on British universities has doubled over the past year as criminals, attempt to steal important research.

According to a Freedom of Information (FoI) request by the London Times, there were 1,152 attacks on universities, including Oxford University and the University College London, in 2016/17. Oxford University was the most affected, with 515 cases of unauthorised access to accounts, according to the report.

Advances in medicine, engineering and missile research were reported to be the targets of hackers. This information, which costs a lot of time and money, is attractive to other nation states and therefore to hackers.

Financial services companies are also major targets of cyber criminals, but these organisations have huge IT and cyber security budgets as competency is business critical.

Tracy Andrew, chairman of the defence industry security association and consultant at T&C Consulting, has worked extensively in the NHS. He said the recent WannaCry ransomware attack revealed weak security in the NHS and was a good example of how organisations in different sectors prioritise investment.

“When it comes to universities, they are thinking about academic studies and research and not the protection of the network,” said Andrew.

According to The Times, Carsten Maple, director of cyber security research at Warwick University, called for a tightening of cyber defences at universities.

“Universities drive forward a lot of the research and development in the UK. Intellectual property takes years of know-how and costs a lot, if someone can get that very quickly, that’s good for them. Certainly, somebody might attack a university and then provide that information to a nation state,” he said.

Computer Weekly

You Might Also Read: 

Canadian University Hit For $12m Phishing Scam:

Iranian Malware Delivered Via Fake Oxford University Sites:

 

« Cybersecurity Tips For Smaller Businesses
India’s Cyber Insurance Business Is Flourishing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.