Common Education Sector security misconceptions

Common Education Sector security misconceptions

2016 hasn’t begun in a very positive way for education institutions. January 2016 saw data on 80,000 students, faculty, and staff at UC Berkeley compromised in the University’s third data breach disclosure of the past 15 months.

This was followed by a breach of 63,000 names and social security numbers of current and former students and staff at the University of Central Florida in early February 2016 obtained when hackers attacked the school’s computer system.

Data breaches and security hacks aren’t new to this industry. In fact, one of the earliest books written about computer hacking featured hacking at universities. Arguably, universities are a breeding ground for next generation of hackers cutting their teeth by creating new malware and probing for vulnerabilities.

So why are these breaches continuing to occur? Paul German, VP EMEA, Certes Networks, outlines three common security misconceptions in the education sector that he insists need to be put right in order to stop these hacks being repeated month after month.

Misconception 1: I can have an open IT environment, or secure IT environment, but not both open and secure
With an ever-expanding attack surface encompassing personal devices, widely shared applications, a culture of open access and often no well-defined perimeter, university environments repeatedly become the perfect playground for hackers to exploit. Yet, having an open IT environment does not mean that it can’t be kept secure. What’s more, simply reducing the number of users on the network or limiting the number of applications available to those users, won’t meet the expectations of students and staff – in fact, it will result in your institution operating much less efficiently.

A more effective strategy is to focus on reducing the attack surface of the most sensitive applications through application segmentation and isolation that tightly controls access to those most sensitive applications, while leaving other applications in a more open stance. One segmentation technique is to use strong encryption for segmenting the sensitive applications and then applying role-based access control. This blocks hacker lateral movement so that if they compromise one of the open applications, they cannot access the more sensitive ones. This way, IT environments can be kept open, with more devices, applications and users than ever, and still be secure. It doesn’t have to be one or the other.

Misconception 2: Breach protection and detection policies are enough to keep the hackers at bay
The Verizon Data Breach Investigation Report 2015 showed that the education sector has by far the most malware incidents of any sector, coming in at 2,332 incidents compared to a mere 350 incidents in the financial sector. What’s more, the report also shows that educational institutions take the slowest time to fix all measured sectors. In general, industry data shows that after much innovation in the breach detection and response areas, the typical breach still is not detected for more than 200 days on average. While an improvement from previous average detection lag of more than a year, this is still too long. These facts alone demonstrate that breach protection and detection policies are no longer enough, by the time a breach has been detected, the damage will have already be done.

With a software-defined breach containment approach to security it is possible for organisations to confine the scope of a breach to a small, defined area, rather than creating a system wide disaster. As well as mitigating damage, breach containment strategies allow security teams to base segmentation on business applications and grant access based on user roles, as opposed to focusing solely on physical or infrastructure based segmentation.

Misconception 3: I know which users and applications can be trusted
This is fairly simple: in reality, no user or application should be trusted. The multiple hacks that have already caused damage for education institutions this year alone show that these institutions, and other organisations alike, must adopt a “No Trust” security model. This assumes that there is no such thing as a trusted network or IT environment. Instead, every user, device, network and application must be treated as untrusted, and all systems should be considered already compromised.

Following this mind-set, sensitive data should be isolated with strong cryptography and access to it should be tightly controlled based on user roles. This segmentation should then be applied consistently across all silos, for all users in the enterprise to keep the open environment under control.

Conclusion
It’s clear that something needs to change. The education sector recognises that an issue exists; yet many are still not putting the proper measures in place. It has never been clearer that now is the time to act, and by thinking of security in a different way and overcoming the common misconceptions outlined above, education institutions can quickly begin the journey from security chaos to security harmony.

[su_button url=”http://certesnetworks.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]Click here to find out more about Certes Networks[/su_button]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top