Subscribe to our free fortnightly newsletter and stay ahead with the latest news in edtech

On the high seas of HE, don't be held to ransom

Universities are ripe targets for cybercriminals, says Robert Stoneman, education analyst at GlobalData

Posted by Rebecca Paddick | June 07, 2017 | Higher education

UK universities will find it sobering that over 4,000 Chinese universities and research institutions were also affected by the same piece of ransomware that crippled NHS IT systems last month. Universities are ripe targets for cybercriminals, and potentially even foreign governments, due to the wide range of information they hold, from personal and financial data to commercially sensitive and potentially highly sensitive research data. Therefore, to safeguard this and avoid a potential PR bombshell, they will be keen to learn the lessons in case the next big attack has UK higher education in its sight.

Aside from ensuring the basics are up to scratch, universities face particular challenges, particularly the growing trend for staff and students to bring their own devices onto campus (BYOD) or to access systems and services remotely.

Vulnerable academia

The cat and mouse nature of cyber security means that even the most diligent of universities can fall victim to a major cyber attack, even if events of the scale that hit the NHS recently are relatively rare. Research carried out last year by the cloud and virtualisation provider VMware found that 87% of UK universities surveyed (among 75 ICT decision makers at over 50 UK universities) had suffered some form of cyber attack.

Shockingly, one in three said they faced attack on average once or more every hour.  What is even more worrying is that 25% said critical intellectual property had been infiltrated, while 43% reported student data being attacked. It is, therefore, no surprise that 85% of those surveyed argued more funding is needed for IT security. As cyber attacks increase in frequency and sophistication, universities will need to focus more resources on ensuring they are ready.

Getting the basics right

The most effective cyber security strategy is built on getting the basics right. Universities not only have to consider their staff, but also the many thousands of students who log into and use IT systems and services daily. It is crucial all are up to speed with the basics of cyber security since even the ablest defences can be circumvented by basic human error. Firstly, they should put in place a cyber security policy that is reviewed and updated regularly.

Secondly, they must ensure everyone connecting to the network is aware of this policy and up to scratch with the basics of cyber security, for instance, not clicking on links in suspicious emails from unknown parties.

The most effective cyber security strategy is built on getting the basics right

Thirdly, universities should regularly drill in preparation for an attack. Regular penetration testing will help discover weaknesses which can then be plugged while testing your data recovery procedures will make dealing with any attack far easier to manage.

Fourthly, universities should audit what data they possess, where it is held and how long for. This will help in terms of planning backups and in making sure that they do not hold any sensitive or personal data unnecessarily, reducing the potential risk of a security breach. Finally, and most important of all, universities must ensure they keep their security systems up-to-date by implementing the latest security patches as soon as possible after they are available. 

BYOD

Arguably the greatest cyber security challenge universities face is the growing tendency for students and staff to access IT systems and services through their own devices. Whether or not this is on campus or via remote access, universities need to mitigate the risks posed by devices outside of their control accessing their networks. The initial temptation might be to put the brakes on such measures in order to re-centralise control over hardware. However, this would be a major misstep: students have come to expect to be able to use their own devices to access university systems and service at their convenience.

Academic staff too will be unhappy about losing access to systems on the go, especially considering that most spend significant time away from campus for research. Instead of turning back the clock, universities need to be proactive and put in place procedures that allow them to maintain as much oversight as possible. From the outset they need to consider the potential risks that BYOD brings: what data devices hold and how it is transferred; the potential for data leakage; the implications of those not associated with the university accessing devices; devices’ security capacities; how to deal with the loss of devices; and the procedure in case someone leaves their studies or employment.

All this considered, universities need to make sure devices connecting to their network meet the requirements laid out in their cyber security policy, for instance, ensuring they run up-to-date operating systems and security software. This should be supplemented with a BYOD acceptable use policy outlining what data can and cannot be accessed or stored on personal devices. Furthermore, larger institutions may want to consider enterprise-level remote access solutions which allow greater administrative control over what users can access on the network, all whilst offering a more seamless user experience.

High stakes for negligence

If the high-profile attack on NHS IT services fails to prompt universities to improve their cyber security, the potential financial penalties certainly will. Brexit will not be enough to prevent UK universities from falling under the remit of the EU’s General Data Protection Regulation (GDPR), coming into force from May 2018. This brings with it the sobering prospect of substantial fines for the most serious negligence, way in excess of the current maximum fine of £500,000.

GDPR will mean that, for the most severe data protection violations or negligence, universities could be liable for a maximum fine of €40m or 4% of global annual turnover, whatever is higher. Even less serious violations could see fines of up to €20m or 2% of global annual turnover. Although it is very unlikely a tidal wave of major fines will emerge from May onwards, as many institutions are still putting in place measures to become compliant, it is clear the financial equivalent of a ‘slap on the wrist’ will no longer cut the mustard.

www.globaldata.com

Subscribe to our free fortnightly newsletter and stay ahead with the latest news in edtech

Related stories

The Future of Security

Talk Straight is awarded UK's Best Security ISP

The 4-pronged approach to tackling cybercrime in education

Getting Schooled: 8 Steps to Protect You from Ransomware

How can ransomware and the WannaCry virus hurt HE?

Education strikes back with data backup and recovery

Preventing a cyber attack on campuses

How can the WannaCry virus hurt HE?

How risk-proof are your school's IT systems?

Schools hit by ransomwares demands

Market place - view all

Saville

We are Saville Audio Visual - AV with a Difference
Saville is...

Compass

Compass Computer Consultants Ltd. has been designing and implement...

Ellucian

The leader in higher education technology. Ellucian delivers the s...

Softcat

Leading IT infrastructure provider of software licensing, hardware...

Schools Broadband

Schools Broadband is one of the UK's largest specialist providers o...

ULCC

Established in 1968 following recommendations of the Flower report,...