Universities Are Targets For Cyber Criminals

The number of cyberattacks on British universities has doubled over the past year as criminals, attempt to steal important research.

According to a Freedom of Information (FoI) request by the London Times, there were 1,152 attacks on universities, including Oxford University and the University College London, in 2016/17. Oxford University was the most affected, with 515 cases of unauthorised access to accounts, according to the report.

Advances in medicine, engineering and missile research were reported to be the targets of hackers. This information, which costs a lot of time and money, is attractive to other nation states and therefore to hackers.

Financial services companies are also major targets of cyber criminals, but these organisations have huge IT and cyber security budgets as competency is business critical.

Tracy Andrew, chairman of the defence industry security association and consultant at T&C Consulting, has worked extensively in the NHS. He said the recent WannaCry ransomware attack revealed weak security in the NHS and was a good example of how organisations in different sectors prioritise investment.

“When it comes to universities, they are thinking about academic studies and research and not the protection of the network,” said Andrew.

According to The Times, Carsten Maple, director of cyber security research at Warwick University, called for a tightening of cyber defences at universities.

“Universities drive forward a lot of the research and development in the UK. Intellectual property takes years of know-how and costs a lot, if someone can get that very quickly, that’s good for them. Certainly, somebody might attack a university and then provide that information to a nation state,” he said.

Computer Weekly

You Might Also Read: 

Canadian University Hit For $12m Phishing Scam:

Iranian Malware Delivered Via Fake Oxford University Sites:

 

« Cybersecurity Tips For Smaller Businesses
India’s Cyber Insurance Business Is Flourishing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.