Universities That Teach Cyber Security At Risk

The cyber security field is a dynamic, challenging and growing fast. Cyber is a field that needs new people to join the fight.  Earning a bachelor’s degree in cybersecurity has definite advantages although many cybersecurity positions require knowledge beyond  computers.

Top job candidate should know something about business, law, criminal justice, risk, statistics, political science and other disciplines. Learning a foreign language can help get a job in cyber intelligence, which is work that examines foreign threat actors. 

But one big problem is that universities are experiencing is cyberattacks targeted against them.

The University of Kentucky has fought off a month-long cyber-attack that impacted the universities healthcare and caused a system-wide slowdown.According to officials, the disruption was caused by crypto-currency mining malware installed by threat actors on the network in February. The malware caused daily interruptions to everyday functions and triggered temporary failures of th universities computer system.

Currently half of all universities in the UK say they are experiencing cyber-attacks on a weekly basis, and a majority believes that their security research has already been compromised as a result.

Universities that want to nurture and safeguard their cyber security research efforts need to keep two things in mind:

  • Firstly, they need to create a suitable environment for that research to take place in.
  • Secondly, they need to adequately protect both the research itself and the wider organisation from cyber security threats.

Cyber security research is fundamentally important if you want to understand the range of potential threats, then get a well-paid job and learn how you can best protect ourselves against them. But putting that protection in place starts at home for universities that want to discover the next cyber security research breakthrough.

Creating virtual safety mechanisms in the form of professional network segmentation and visibility solutions should be a key priority for any university that is serious about investing in its cyber security research capabilities.

Analysts at the University of Texas have found a way to bamboozle malicious hackers into giving away their secrets. The Deep-Dig method tricks hackers onto a decoy site set up to record whatever sneaky tactics are thrown at it. This information is then fed into a computer, where it is analysed to produce clues on how to identify and fend off future hacking attacks.

In response to the growing need for professionals skilled in the protection of digital information, the University of Alabama is about to set up a degree in cyber security. The University’s board of trustees recently approved the Bachelor of Science degree, which will be offered this Autumn. The degree will be housed in the department of computer science which is part of the College of Engineering.

A quality University/College program will offer students the advantage of taking courses not just in cybersecurity, but also in other topics, including writing courses. Taking courses outside of the college major also helps to build a well-rounded graduate with a strong foundation across multiple disciplines.

FE News:     InfoSecurity Magazine:       InfoSecurity Magazine:    Alabama News:      Greenville Business:   Image: Pexels

You Might Also Read: 

Lancaster University Hit By Data Thieves

 

« Artificial Intelligence, Automation, Training & Jobs
Stay Cyber-Secure Working From Home »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

eTech S.C.

eTech S.C.

eTech specialize in a broad range of technology solutions, including software development, cybersecurity, infrastructure, and IT outsourcing (ITO) services.

Sorenson Capital

Sorenson Capital

Sorenson Capital is a leading venture capital firm focused on investing in early and growth-stage AI, cybersecurity, B2B software, and DevOps & infrastructure companies.