• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

Beat the Breach: How to Strengthen Your College’s Network Security

Network experts reveal why college networks are juicy targets for hackers, and how schools can tighten network security before a fresh attack.

April 20, 2015 Jessica Kennedy Leave a Comment

Since most colleges have their physical security down pat, then that should mean their cybersecurity is under lock and key, right?

Wrong.

With network hackers growing smarter and threats becoming more inevitable, colleges are accepting that breaches are bound to happen.

However, even though colleges expect the worst to happen to their networks, they should still arm themselves with the best protection strategies.

Greg Harp, the media relations executive for LoudCloud, says that colleges are throwing their data up to servers like the Cloud because of its low cost and space-saving capabilities.

“When you look at that perfect storm, it becomes much more challenging in education to try and protect the network, try to prevent intrusions, and try to protect them from data breaches.”

–  Sandeep Kumar, Principal Solution Marketing Manager, ForeScout

He says that a college’s IT department may also choose to run different software and host that software on the school’s network, which creates the need for additional resources.

“Many of these campuses already have space issues and a whole lot of other issues,” Harp says. “So being able to [use] the Cloud saves them that cost, space, the ability to upgrade online rather than a host of consultants trying to come onsite and figure out the customizations they’ve done over the last three years of when they installed that on their network.”

But while the Cloud and other networks solve these problems, they create security issues for the college’s network.

What Makes Hackers Covet College Networks

Deren Chen, Inside Solution Architect for Security at CDW-G says college networks are vulnerable to attacks due to their openness, which means they can support any device.

“If you look at higher education as a whole, these are probably some of the most open networks,” he says. “If you’re staying within a dorm, not only do you bring the device into the dorm, you’re inside the university network. There are so many users, so much information, like social security information, right there for the taking.”

Sandeep Kumar, Principal Solution Marketing Manager, ForeScout says cyber threats on colleges networks are more critical when compared to company networks.

He says this is because colleges have unique device features that reveal three main soft spots for threats to sneak into:

1) BYOD capabilities

“I think higher education is the sector with the highest percentage of personal devices,” Kumar says. “We have customers who have said in the last year, they have gone up to 80 or 90 percent of the devices on the network being personal devices owned by students or faculty. BYOD is not really an option in education.”

Pages: Page 1 Page 2 Page 3

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jessica Kennedy
Jessica Kennedy

Jessica Kennedy is an editor at TechDecisions Media, targeting the higher education market. Jessica joined the TechDecisions team in 2014 and covers technologies that improve teaching and learning.

Tagged With: Antivirus, Data Security, Higher Ed, Malware Protection

Related Content:

  • MOVEit vulnerability, zero-day, Progress Software Act Now: Vulnerability in Progress Software’s MOVEit Transfer…
  • iPhone security bug, Apple, Kaspersky Kaspersky Discovers New 0-Click iOS Exploit
  • C919 The Cyberattacks and Insider Threats During The Development…
  • FTC Ring FTC Accuses Ring of Watching Private Videos, Poor…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.