• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

8 Tips and Technologies That Can Keep a College Network Safe

Cybersecurity expert Dennis Egen reveals the top 8 tips and technologies colleges should follow to keep their network defenses high.

September 14, 2015 Jessica Kennedy 5 Comments

Previous Slide Next Slide

3) Involve an outside firm

Egen says a colleges’ first line of defense for their network is an outside firm.

He says outside firms can assess a network’s vulnerabilities and recommend the next steps to take to protect the network.

He also says an outside firm can be especially handy if inside perspectives deem everything is “safe and secure” when there are hidden risks.

“It is important is to have some objectivity,” Egen says. “If you talk to your internal folks, they may still tell you that everything is secure…It’s good to have somebody from the outside to cut through the bureaucracy and politics and tell you where your weaknesses are. From there, based on budget, timing and risk, the things you’re afraid of, you should be able to get that laundry list of things you want to buy or changes you need to make.”

4) Firewalls

Egen says firewalls are a useful technology to equip a college’s network with.

He says firewall solutions are often free, and can prevent and mitigate things like sequel injection attacks and denial of service.

He also says firewalls can sometimes be powerful enough to protect networks against more sophisticated attacks.

Egen says he used to use dotDefender as a firewall solution for his network.

5) Data loss prevention systems (DLPEs)

Egen says DLPEs can increase the strength of a network’s protection.

However, he says colleges should be careful with DLPEs because they can often be intrusive and make day to day tasks more challenging for end users.

Egen also says colleges that invest in DLPEs should implement them in higher risk departments on campus.

“There are a lot of false positives, so make sure you only use DLPEs in your high-risk areas,” he says. “Things like the bursar’s office, or wherever they’re handling transactions or credit card numbers, for instance.”

6) Switches

Egen says switches are good protection tools that handle denial of service attacks.

He says switches are a good solution for denial of service attacks because service attacks look like regular traffic on a college’s website.

Switches will work cohesively with firewall and network intrusion solutions to keep network defenses high, and redirect that traffic so the website functionality stays up to speed.

“Denial of service attacks can be very hard to defend against because it looks like normal traffic to your website, but, there are a certain amount of requests from an IP range in a certain amount of time, and you want to take that traffic and route it somewhere else so it doesn’t slow down your website,” Egen says. “There are a lot of switches out there, particularly by Cisco, that can handle that really well.”

Pictured is a member of the Cisco Catalyst 3560 Series Switches.

7) Make sure all your data is encrypted

Egen says colleges should have their network data encrypted to keep it protected.

Encryption will ensure that only the right eyes see a college’s data, and keep the wrong ones locked out.

Egen says there are plenty of encryption solutions out there to keep data secured.

He also says colleges’ IT departments can even partner with a development team to determine the best way to execute encryption.

“You can do some mitigation to make sure all of your data is encrypted, and there are a lot of really nice encryption software out there,” Egen says. “There’s SequelServer, TDE (transparent data encryption), which allows you to seamlessly encrypt everything in your database, from student information or social security numbers. That’s something your network team can work on with your development team to launch.”

8) Put your hacker hat on

Egen says colleges can best defend their networks by thinking like a hacker.

He says when colleges break out of defense mode and channel their thinking towards potential threats, they can increase their likelihood of decreasing actual network attacks.

Egen also says if colleges’ internal departments struggle with this mindset, they can bring in a firm who can take over from there.

“I think it’s important to bring in a firm or people who can think like hackers,” he says. “They can get into the mindset of the people who are trying to attack you. It’s a different sort of mentality versus just the defensive mentality, which is just to prevent. I think that can help you flush out some of the risks, especially on the web application side.”

Dennis Egen says even though colleges will defend their networks until the end of time, there will still be loopholes for hackers to crack through.

He says college networks are weakest through individual portals, such as through class material and registration portals.

“You can defend your network as much as you want, but a lot of times, universities will have web applications out there, whether they’re news and events or classroom systems like Blackboard or the registration systems,” says Egen, President & Founder of Engine Room. “If you have these little portals into your networks via these web applications, it’s no good…A hack could try to get into your network through a web database.”

However, Egen says colleges can up their network protection by putting together a good team that knows where and how to harden those weak spots.

He also says colleges should invest time and network education for this team to perform well.

“The technology is only as effective as the people and procedures implementing it,” Egen says. “If you’re a technology leader, start by identifying the people who have a knack and interest in security, get them trained, hire some outside consultants and put together a security team. It doesn’t have to be a large team or an expensive endeavor; identify those people and come up with a roadmap and plan [to deal with] the type of risks you have.”

Egen says another hefty line of network defense can be found in the evaluation of third parties that are involved with important parts of a college’s network, including storage of student information and business transactions.

He says when colleges evaluate the work of third parties, they can ensure that those parties are utilizing best practices to keep the network safe.

“This is a big one, especially with organizations that are on a budget,”Egen says. “Obviously they don’t build things themselves – they use outside vendors for their payment processing, students portals, web applications for their websites. Colleges should evaluate not only what they’re doing internally, but that they have the proper procedures in place. There’s a lot of brain work you can use to evaluate third party vendors and evaluate risk assessment.”

Aside from man power, Egen says there are some “tried and true” technologies and tips colleges can use to guard their networks.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jessica Kennedy
Jessica Kennedy

Jessica Kennedy is an editor at TechDecisions Media, targeting the higher education market. Jessica joined the TechDecisions team in 2014 and covers technologies that improve teaching and learning.

Tagged With: Antivirus, Data Security, Higher Ed, Malware Protection

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. a10 says

    December 13, 2016 at 11:20 pm

    Excellent read, Positive site, where did u come up with the information on this posting? I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work

    Reply
  2. william says

    January 25, 2017 at 5:06 am

    Thanks for sharing such a informative blog.

    Reply
  3. baju kebaya says

    March 7, 2017 at 2:43 am

    your blogs is very informative

    Reply
  4. sophia watson says

    November 26, 2018 at 2:08 am

    Nice stuff

    Reply
  5. assignment mart says

    January 13, 2019 at 5:00 am

    still Struggling With Your mechanical assignment , electrical assignment , electronic assignment get expert assignment help from the experts of assignment mart .the best assignment provider in the field .

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.