• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Beat the Breach: How to Strengthen Your College’s Network Security

Network experts reveal why college networks are juicy targets for hackers, and how schools can tighten network security before a fresh attack.

April 20, 2015 Jessica Kennedy Leave a Comment

Since most colleges have their physical security down pat, then that should mean their cybersecurity is under lock and key, right?

Wrong.

With network hackers growing smarter and threats becoming more inevitable, colleges are accepting that breaches are bound to happen.

However, even though colleges expect the worst to happen to their networks, they should still arm themselves with the best protection strategies.

Greg Harp, the media relations executive for LoudCloud, says that colleges are throwing their data up to servers like the Cloud because of its low cost and space-saving capabilities.

“When you look at that perfect storm, it becomes much more challenging in education to try and protect the network, try to prevent intrusions, and try to protect them from data breaches.”

–  Sandeep Kumar, Principal Solution Marketing Manager, ForeScout

He says that a college’s IT department may also choose to run different software and host that software on the school’s network, which creates the need for additional resources.

“Many of these campuses already have space issues and a whole lot of other issues,” Harp says. “So being able to [use] the Cloud saves them that cost, space, the ability to upgrade online rather than a host of consultants trying to come onsite and figure out the customizations they’ve done over the last three years of when they installed that on their network.”

But while the Cloud and other networks solve these problems, they create security issues for the college’s network.

What Makes Hackers Covet College Networks

Deren Chen, Inside Solution Architect for Security at CDW-G says college networks are vulnerable to attacks due to their openness, which means they can support any device.

“If you look at higher education as a whole, these are probably some of the most open networks,” he says. “If you’re staying within a dorm, not only do you bring the device into the dorm, you’re inside the university network. There are so many users, so much information, like social security information, right there for the taking.”

Sandeep Kumar, Principal Solution Marketing Manager, ForeScout says cyber threats on colleges networks are more critical when compared to company networks.

He says this is because colleges have unique device features that reveal three main soft spots for threats to sneak into:

1) BYOD capabilities

“I think higher education is the sector with the highest percentage of personal devices,” Kumar says. “We have customers who have said in the last year, they have gone up to 80 or 90 percent of the devices on the network being personal devices owned by students or faculty. BYOD is not really an option in education.”

Pages: Page 1 Page 2 Page 3

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jessica Kennedy
Jessica Kennedy

Jessica Kennedy is an editor at TechDecisions Media, targeting the higher education market. Jessica joined the TechDecisions team in 2014 and covers technologies that improve teaching and learning.

Tagged With: Antivirus, Data Security, Higher Ed, Malware Protection

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.