Universities That Teach Cyber Security At Risk

The cyber security field is a dynamic, challenging and growing fast. Cyber is a field that needs new people to join the fight.  Earning a bachelor’s degree in cybersecurity has definite advantages although many cybersecurity positions require knowledge beyond  computers.

Top job candidate should know something about business, law, criminal justice, risk, statistics, political science and other disciplines. Learning a foreign language can help get a job in cyber intelligence, which is work that examines foreign threat actors. 

But one big problem is that universities are experiencing is cyberattacks targeted against them.

The University of Kentucky has fought off a month-long cyber-attack that impacted the universities healthcare and caused a system-wide slowdown.According to officials, the disruption was caused by crypto-currency mining malware installed by threat actors on the network in February. The malware caused daily interruptions to everyday functions and triggered temporary failures of th universities computer system.

Currently half of all universities in the UK say they are experiencing cyber-attacks on a weekly basis, and a majority believes that their security research has already been compromised as a result.

Universities that want to nurture and safeguard their cyber security research efforts need to keep two things in mind:

  • Firstly, they need to create a suitable environment for that research to take place in.
  • Secondly, they need to adequately protect both the research itself and the wider organisation from cyber security threats.

Cyber security research is fundamentally important if you want to understand the range of potential threats, then get a well-paid job and learn how you can best protect ourselves against them. But putting that protection in place starts at home for universities that want to discover the next cyber security research breakthrough.

Creating virtual safety mechanisms in the form of professional network segmentation and visibility solutions should be a key priority for any university that is serious about investing in its cyber security research capabilities.

Analysts at the University of Texas have found a way to bamboozle malicious hackers into giving away their secrets. The Deep-Dig method tricks hackers onto a decoy site set up to record whatever sneaky tactics are thrown at it. This information is then fed into a computer, where it is analysed to produce clues on how to identify and fend off future hacking attacks.

In response to the growing need for professionals skilled in the protection of digital information, the University of Alabama is about to set up a degree in cyber security. The University’s board of trustees recently approved the Bachelor of Science degree, which will be offered this Autumn. The degree will be housed in the department of computer science which is part of the College of Engineering.

A quality University/College program will offer students the advantage of taking courses not just in cybersecurity, but also in other topics, including writing courses. Taking courses outside of the college major also helps to build a well-rounded graduate with a strong foundation across multiple disciplines.

FE News:     InfoSecurity Magazine:       InfoSecurity Magazine:    Alabama News:      Greenville Business:   Image: Pexels

You Might Also Read: 

Lancaster University Hit By Data Thieves

 

« Artificial Intelligence, Automation, Training & Jobs
Stay Cyber-Secure Working From Home »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.