C+ ‘Must try harder: Cybersecurity in Education

September: it’s a heady mix of the crisp autumn air and back-to-school stationery. For many IT and security teams in the education sector, it’s the beginning of a nine-month-long cyber nightmare where staff and students lay waste to a summer of careful cybersecurity planning.

By freshers’ week 2018, The University of Edinburgh, among others, had already been hit by a major cyberattack. The consensus is that its students who will play havoc with the defenses of education networks across the country. So, what’s an IT manager to do until mid-July when the vulnerabilities leave for the summer holiday?

A target-rich classroom

Despite attempts to improve general understanding of online and IT threats, with schools, colleges, and universities all issuing ICT policies to minimize user errors, experts suggest that these institutions are more at risk of attack than ever before. At the beginning of the autumn term, the threat level intensifies with new parents, teaching staff, and students all accessing previously unknown digital materials, and the chances to exploit mistakes, become more readily available. And of course, let’s not forget about the case of one student who managed to cause a denial of service attack on the entire university network by trying to take a fellow gamer out of action.

But of course, it’s not just about the users – public sector IT teams remain stretched with limited budgets and resources, trying to manage expanding lists of security measures and protocols, now with the added task of educating their entire user base about basic IT security. The holy trinity of IT security from just a little over a decade ago – anti-malware, anti-spam, and patch management – no longer cuts the mustard. Today, it’s also about managing risk, detecting vulnerabilities, penetration testing, and GDPR.

GDPR and education

Since GDPR came into force, all organizations have tirelessly looked to tighten their security belts and ensure they’ve taken appropriate measures to avoid an attack for which they could be blamed and, more importantly, fined. Sophisticated malware detection and email gateway protection are a given, but there are also more simple ways to stop some of the most fervent types of attacks that many IT teams are unaware of or neglect.  

A survey by digital infrastructure and services provider for the education sector, Jisc, highlighted how the top cybersecurity risk for universities and colleges was accidental breaches. These breaches come in the form of social engineering and phishing attacks – a type of attack that relies on a lack of awareness and human error. It’s no longer about a user relying on a clever algorithm to detect a threat, it’s time for the user to switch on their threat radar. So, how can a small team, or single IT manager solve this risk?

A for effort

Basic security awareness training is needed from day one – users need to know how not to fall foul of an opportunistic hacker or scammer. One of the most common ways to infiltrate a system is to fool staff and students – it’s as simple as sending emails purporting to come from the admin or finance team looking to get payment for school lunches or more seriously, rent for accommodation or a demand for payment of fees. Recognizing rogue senders is one thing, but how can users be blamed for handing over payment details to a legitimate-looking sender?

And this is where there has to be an interplay between technology solutions and user insight – a spoofed email is almost impossible to detect by a user, and institutions need to have adequate defenses in place to block illegitimate mail so the user never stumbles over it.

The education sector is such a melting pot of different types of users with varying values (freedom of information, expression, exchanges of ideas, etc) compared to organizations that employ adults with a single view of achieving business goals. But the goal of all IT teams is the same – to keep the network and all users secure.

Tell, teach, involve

The saying ‘Tell me and I forget. Teach me and I remember. Involve me and I learn’ is corny but true. A surefire way to capture and maintain interest in IT security is to get staff and students involved. Working in this industry, we take levels of understanding of cyber threats for granted and will no doubt pass on this security-savvy consciousness to our children. But imagine for a moment, you don’t work in tech, have only heard about ‘phishing’ and ‘malware’ on a headline report on the BBC News, and can only do the basics on your Windows 7, outdated PC.

Now imagine you spend 30 minutes every term explaining the simplicity of a phishing attack and how users can spot a rogue sender. Furthermore, you employ DMARC at p=reject, and users can rest assured that a spoofed email address, with a view to stealing data or money, won’t even hit their inbox. Equation solved.

Want to be a real star pupil? Why not check your current email security setup with our free investigate tool? It’ll give you results for the current SPF, DKIM, and DMARC configuration of your domain, and next steps.


PUBLISHED BY

Clare Holmes

28 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more