• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

What To Do When Viruses Weaken Your College’s Network

AV expert Joel Bilhiemer discusses how colleges can cope with and prepare their networks for data breaches.

June 16, 2015 Jessica Kennedy Leave a Comment

Joel Bilhiemer says he guarantees your college’s network has viruses right now.

“If you transmit data of any kind, in any form, that data has value to somebody,” says Bilhiemer, CISSP at Pershing Technoloiges. “It’s our goal as AV professionals to secure that data.”

During the InfoComm15 educational summit “Technology Management in Higher Education,” Bilhiemer lectured on the risks of cybersecurity and strategies colleges can follow to boost their network defenses.

Bilhiemer says that hackers can get in a network via network vulnerabilities, similar to how hackers instigated the infamous Target breach through the store’s HVAC system.

He says hackers were able to crack into millions of credit card accounts in Target’s HVAC system because no one usually checks an HVAC system for viruses or vulnerabilities.

Bilhiemer’s Epidemiology of Cybersecurity:

1) Infection
Focus on containing a threat rather than initial prevention.
2) Research
Identify supportive sources, such as a CISO or IT member.
3) Diagnosis
Perform a risk analysis, audit your college’s systems and review your college’s policies.
4) Treatment
Deploy a security policy, harden your systems. Repeat.

“Once we move into wireless systems, Cloud systems, network systems and sharing data across networks, it becomes a bigger issue,” Bilhiemer says. “I want people to think of …the idea that just like any computer network, we have a scaled, layered approach to how we [AV departments] do things, and any of them can be a penetration point.”

Bilhiemer also says that college AV departments have a huge responsibility in keeping campus networks safe, especially after a new technology installation occurs and the vendors/integrators pack up their tools.

“Our industry often has a project mentality,” he says. Integrators and vendors can say, “I built a facility, it looks fantastic, I get my certificate and check, and I’m done. But you [the AV folk] aren’t done. You still have to manage and operate that install. You might have to deal with a breach somewhere. In order to build operation framework, you have to think about operation lifecycle.”

Pages: Page 1 Page 2

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jessica Kennedy
Jessica Kennedy

Jessica Kennedy is an editor at TechDecisions Media, targeting the higher education market. Jessica joined the TechDecisions team in 2014 and covers technologies that improve teaching and learning.

Tagged With: Antivirus, Data Backup & Recovery, Data Security, Higher Ed, Malware Removal

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.