Are you a student? Are you aware that your school/university is exposed to cyber attacks?

It is not always public knowledge that educational institutions often get hit by cyber-attacks. Since schools like any other business are increasingly dependent on technology, educational institutions display very real risks and open doors for cyber criminals through the Internet of Things (IoT), ‘Bring Your Own Device (BYOD)’ culture, plus tech and robotics labs. The knock-on effect of a cyber incident at an educational facility has the potential to be financially and reputationally catastrophic.

In 2016 it was reported that a university in South Africa had their website was taken down, leaking exam papers and the details of over 18,000 students, in addition to perpetrators publicly posting what was believed to be the login details for the University’s intranet.

You should consider the following:

  • Safeguard institution-owned devices – All devices owned by the educational institution should at the very least have an anti-virus program installed, in addition to adware and malware protection. A further aspect to consider is remote filtering technology, especially in instances where devices are used outside the institution’s network.
  • BYOD Policy – The first line of defense is to keep guest devices separate from the network, allowing the institution to keep data secure on an administrative network. As well as monitor traffic more closely. When it comes to sending sensitive information, it is crucial to implement a secure file exchange solution that can protect against cyber threats such as phishing scams.
  • Multi-Factor Authentication – While passwords alone do not provide adequate levels of security and hackers are able to circumvent physical biometrics such as fingerprint identification as a single layer of authentication.

Additionally, adopting and implementing better cyber security measures is the first line of defense against a potential cyber event. Students and staff members should also be aware of potential risks and to spot obvious attempts in their daily interactions on the web, in e-mails and on devices.

Source: IT News Africa