C+ ‘Must try harder: Cybersecurity in Education

September: it’s a heady mix of the crisp autumn air and back-to-school stationery. For many IT and security teams in the education sector, it’s the beginning of a nine-month-long cyber nightmare where staff and students lay waste to a summer of careful cybersecurity planning.

By freshers’ week 2018, The University of Edinburgh, among others, had already been hit by a major cyberattack. The consensus is that its students who will play havoc with the defenses of education networks across the country. So, what’s an IT manager to do until mid-July when the vulnerabilities leave for the summer holiday?

A target-rich classroom

Despite attempts to improve general understanding of online and IT threats, with schools, colleges, and universities all issuing ICT policies to minimize user errors, experts suggest that these institutions are more at risk of attack than ever before. At the beginning of the autumn term, the threat level intensifies with new parents, teaching staff, and students all accessing previously unknown digital materials, and the chances to exploit mistakes, become more readily available. And of course, let’s not forget about the case of one student who managed to cause a denial of service attack on the entire university network by trying to take a fellow gamer out of action.

But of course, it’s not just about the users – public sector IT teams remain stretched with limited budgets and resources, trying to manage expanding lists of security measures and protocols, now with the added task of educating their entire user base about basic IT security. The holy trinity of IT security from just a little over a decade ago – anti-malware, anti-spam, and patch management – no longer cuts the mustard. Today, it’s also about managing risk, detecting vulnerabilities, penetration testing, and GDPR.

GDPR and education

Since GDPR came into force, all organizations have tirelessly looked to tighten their security belts and ensure they’ve taken appropriate measures to avoid an attack for which they could be blamed and, more importantly, fined. Sophisticated malware detection and email gateway protection are a given, but there are also more simple ways to stop some of the most fervent types of attacks that many IT teams are unaware of or neglect.  

A survey by digital infrastructure and services provider for the education sector, Jisc, highlighted how the top cybersecurity risk for universities and colleges was accidental breaches. These breaches come in the form of social engineering and phishing attacks – a type of attack that relies on a lack of awareness and human error. It’s no longer about a user relying on a clever algorithm to detect a threat, it’s time for the user to switch on their threat radar. So, how can a small team, or single IT manager solve this risk?

A for effort

Basic security awareness training is needed from day one – users need to know how not to fall foul of an opportunistic hacker or scammer. One of the most common ways to infiltrate a system is to fool staff and students – it’s as simple as sending emails purporting to come from the admin or finance team looking to get payment for school lunches or more seriously, rent for accommodation or a demand for payment of fees. Recognizing rogue senders is one thing, but how can users be blamed for handing over payment details to a legitimate-looking sender?

And this is where there has to be an interplay between technology solutions and user insight – a spoofed email is almost impossible to detect by a user, and institutions need to have adequate defenses in place to block illegitimate mail so the user never stumbles over it.

The education sector is such a melting pot of different types of users with varying values (freedom of information, expression, exchanges of ideas, etc) compared to organizations that employ adults with a single view of achieving business goals. But the goal of all IT teams is the same – to keep the network and all users secure.

Tell, teach, involve

The saying ‘Tell me and I forget. Teach me and I remember. Involve me and I learn’ is corny but true. A surefire way to capture and maintain interest in IT security is to get staff and students involved. Working in this industry, we take levels of understanding of cyber threats for granted and will no doubt pass on this security-savvy consciousness to our children. But imagine for a moment, you don’t work in tech, have only heard about ‘phishing’ and ‘malware’ on a headline report on the BBC News, and can only do the basics on your Windows 7, outdated PC.

Now imagine you spend 30 minutes every term explaining the simplicity of a phishing attack and how users can spot a rogue sender. Furthermore, you employ DMARC at p=reject, and users can rest assured that a spoofed email address, with a view to stealing data or money, won’t even hit their inbox. Equation solved.

Want to be a real star pupil? Why not check your current email security setup with our free investigate tool? It’ll give you results for the current SPF, DKIM, and DMARC configuration of your domain, and next steps.


PUBLISHED BY

Clare Holmes

28 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

TLS certificates are changing: What you need to know

Red Sift

Executive summary: TLS certificates are about to get significantly shorter-lived. Starting 15 March 2026, newly issued public-trust certificates will max out at 200 days—and just three years later, that lifespan drops to 47 days. Backed by Google, Apple, and Mozilla, this shift aims to make the web safer through fresher data, faster failover, and…

Read more
DKIM

The hidden threat: How misconfigured DKIM enables replay attacks

Red Sift

Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys and related misconfigurations open your…

Read more
BIMI

Why DMARC and BIMI are a business priority

Jack Lilley

Email threats aren’t slowing down, and neither should your authentication strategy. In our recent joint webinar with Marigold, “From DMARC to BIMI: Navigating the New Email Authorization Landscape,” we broke down what today’s evolving standards mean for both security and marketing teams—and how to take action now with our free Red Sift Investigate tool.…

Read more
ASM

Zoom stops zooming: Why active monitoring is essential

Billy McDiarmid

​On April 16, 2025, Zoom experienced a significant global outage that disrupted video conferencing services and access to its website for thousands of users, as well as their corporate email for all their employees. It was quickly identified as a domain name registration status problem. Despite being a critical name for Zoom, somehow, the…

Read more