Michigan State, Texas A&M studying impact of driverless cars on workforce
February 21, 2018
The Michigan State-led study was commissioned by a nonprofit testing facility based in Michigan.
Commentary: How UTM helps create a balance between functionality and security, without draining resources.
Sowjanya O’Neill is Sr. Manager of SLED Marketing at Fortinet. She is a technology and marketing leader with over 15 years of experience bringing...
Students are changing the ways they engage with their education, using multiple devices and applications to organize and complete their assignments. But the open network required to enable and encourage today’s tech-based learning opens higher education institutions to significant cyber risks.
The inclusive and collaborative nature of higher education networks makes them a prime target for cybercriminals. More than 1,152 intrusions into U.K. university networks were recorded in the 2016-17 academic year, and some universities were hit by more than 1,000 attacks a month. These included ransomware, phishing and denial of service.
Fighting off this magnitude and variety of attacks requires a robust and evolving cybersecurity strategy. A multi-pronged approach that takes best practices into account is in order.
Top cybersecurity requirements for higher education
As colleges and universities seek to balance innovative technical capabilities with strong network and data security, here are three of the top cybersecurity features necessary for a strong security posture:
1. Centralized control console
As universities attempt to mitigate threats from multiple attack vectors, they are deploying increased numbers of point solutions. However, relying on information from each of these siloed tools can be burdensome on resources. This is because each of these disparate point solutions provides different intelligence and varying degrees of data visibility.
To effectively manage network security controls, university IT teams need to have centralized, single-pane-of-glass visibility into data movement across the network and a simplified view of security alerts across disparate security devices. This is integral, as IT teams do not usually have the manpower to cross-correlate this data and monitor each solution themselves.
2. Protection against zero-day and evolving threats
Colleges must also protect networks against the sophisticated cyberattacks and zero-day exploits used by cybercriminals to steal data — be it the personal information of students and faculty or proprietary research done at the university. These attacks can be disseminated through a multitude of attack vectors such as emails, web applications or malicious links and attachments. Among the most prominent examples of this type of threat in the education space is ransomware. However, universities are also regularly targeted with phishing attacks and distributed denial-of-service (DDoS) attacks using botnets to achieve their means.
Moreover, universities are also targeted by zero-day vulnerabilities, or flaws in their hardware and software, that are difficult to detect until it is too late and a breach has occurred. To mitigate each of these types of attacks, universities need both global and local threat intelligence to update their security infrastructure for protection against zero-day exploits.
3. Optimized spending and resources
In addition to IT infrastructure and security solutions, colleges must also employ IT teams that can deploy each piece of technology and ensure it runs effectively. Building out this infrastructure and team on a limited budget is a challenge, especially given the cybersecurity skills gap employers are facing when hiring for these positions. As a result, IT teams with limited resources often put an emphasis on functionality while neglecting security. However, in today’s threat landscape, security cannot be an afterthought.
To maximize limited IT resources, colleges need integrated and automated security infrastructure that allows rapid response to each incident, without having to wait for data to be collated and addressed by a busy team member. Additionally, these capabilities result in decreased cybersecurity costs, as integrated solutions are more cost-effective than disparate point solutions or employing a large enough IT team to manage the network manually.
Securing higher education
To effectively secure colleges and universities, there must be a strong security process in place that does not inhibit the use of applications and devices across campus while meeting each of the needs stated above. Additionally, it must use automation to assist with, rather than complicate, the tracking and mitigating of security incidents across the network. This can be achieved through unified threat management (UTM).
Unified threat management allows universities to combine multiple security solutions into a single console to monitor and centrally manage network activity from one location.
As a best practice, look for a solution that incorporates firewalls, application protection, sandboxing, web filtering, endpoint protection and more to mitigate the threats presented by open networks, BYOD, applications, botnets, etc.
Combining multiple security solutions from a single vendor into a connected UTM means that there is only one interface that university IT teams must manage, while minimizing downtime due to maintenance. UTM offers a single-pane-of-glass view, with IPS and IDS, to view data movement and requests across the network, simplifying operations for IT teams.
To ensure the most up-to-date security policies, while maximizing IT teams’ time, look for a UTM that is automatically updated with threat intelligence from each tool within the UTM, providing both global and local threat intelligence. This intelligence protects university networks from known malicious attacks as well as derivative zero-day threats. These automatic updates save IT teams the time it would take to assess and correlate data from separate solutions to make it actionable, before updating each solution with the necessary signatures. This allows for robust security without being a drain on university resources or budgets.
Today, higher education institutions have to be able to provide the networked, tech-enabled learning experience that both students and faculty expect, while simultaneously protecting private data. Amid limited IT resources, BYOD proliferation and constant new threats, higher education is in a uniquely complicated position when it comes to network security. Implementing a connected UTM helps universities find a balance between functionality and security without draining resources.
Sowjanya O’Neill is Sr. Manager of SLED Marketing at Fortinet. She is focused on helping educational institutions become cyber resilient.