With the education sector being the 3rd worst hit in 2021 by cyberattacks, behind only healthcare and the wider public sector, it’s clear there are some issues that need to be addressed.
But what are they, why do they cause such a problem and what could provide a solution?
There are several cyber threats that are traditionally associated with higher education, however, lots of changes introduced through rapid shifts in service delivery due to the pandemic have not only increased the risk of those threats but introduced new ones too.
In addition to the above (because it wasn’t fun enough as it is), there is a constant increase in the demand for services and a variety of capabilities. With a frequently changing digital landscape including additional systems being added that require access from anywhere at any time, how do you go about securing an organisation that is built on the premise of sharing information and has users with perhaps less security sense than most?
What takes priority? Where do you start? Where is the line between university requirement and invasion of privacy? How do you balance user experience and performance with risk?
Quickly, let’s take a look - at what's covered:
Cyber Challenges in Higher Education 2022
Higher Education cyber considerations for 2022
-Endpoint Protection: We asked the question
-Zero Trust: Is the time right?
-Managed Detection and Response
Cybersecurity challenges in Higher Education 2022.
Growing cyberspace
We all know that there are more ‘things’ to secure, so let's be more specific. The pandemic forced higher education establishments to embrace remote learning and as a result, this meant there was an increase in staff and students using their own devices, but this is just the tip of the iceberg.
As higher education establishments increase their usage of cloud-based systems, SaaS, and other solutions to meet the ever-increasing (and over-stated) demands of the user, they are adding more ‘things’ to secure, especially when these systems are being accessed from random locations globally.
All this before we even mention the growth of the Internet of Things (IoT) and Operational Technology (OT) in Higher education. Distance learning, online collaboration, and video conferencing have now become an intrinsic part of universities, along with increasingly ‘digital’ campuses comprising smart TVs, speech-enabled assistants, and other often unmanaged technology. As a result, the device ecosystems supporting these transformations have had to evolve from traditional IT infrastructure to consumer technologies, which presents a significant risk when not understood or thought through.
The other point to note here is with an increased digital landscape often comes increased data. Understanding this data, monitoring it, and deriving intelligence from it is the foundation to being able to secure that landscape. The real pain in the neck here is, that with this growth (largely in the cloud or at least off-campus) comes scarcity in visibility, making it difficult to understand the risks and mitigate against them.
Remote learning was always here but now it’s an issue
Why? Access - expected anytime, anywhere, and by everyone.
Yes, the pandemic pushed universities to move to remote learning overnight but this was a trend that was growing regardless. Online courses, international students and general e-learning have been on the rise for some time and it doesn’t look like it’s slowing down.
Although this can cause sleepless nights for those concerned with service delivery, we’re here to discuss the cybersecurity implications of anytime, anywhere access. This starts with the device and it can be completely random.
Students rarely do things with security in mind - in all fairness, cyber security professionals aside, they aren’t alone. So when it comes to buying a laptop, installing some anti-virus software, having any kind of security, using open wi-fi, clicking on emails, their browsing habits and even locking their front door, it’s safe to say - their attitude to security is often fairly ropey.
This poses a threat when connecting to university systems as you can’t trust the device students are connecting with, it’s quite likely that a number of them will be infected with some sort of malware. Any vulnerability through the connection process or without the right permissions in place, could open the door to malicious activity spreading across the wider network.
The challenge is not the principal, it’s the scale. With so many connections into university systems by so many untrusted devices, there is a huge risk to mitigate when it comes to remote access. The architecture of most university networks was not built to support such a distributed user-base with remote access being at least on par with campus connectivity, if not greater and due to this unsuitability, making it work rather than making it secure is historically the focus.
The skill gap vicious circle
There is a digital skills gap in the UK and universities are struggling to acquire and retain employees who have key skills within IT. As cyberspace is increased at universities and more systems are added, it requires specialist skills to not only maximise the capability of these systems and run them but also to secure them.
The problem we see fairly frequently is, when higher education establishments are able to get their hands on talent to either grow into these positions or come in and tackle specific problems, that talent is often snatched up by private sector businesses who can offer a much more attractive package.
With this skill gap in place, you’re often left with a skeleton team that are trying to stitch the fabric together, often through the procurement of solutions that should solve problems but more often than not only exasperate the problem. Why?
The more 3rd party vendors that come into the estate the greater the need for specialists to maintain and maximise these new solutions. Without someone who knows what they're doing, these solutions can have a low capability utilisation and can become just another thing to manage.
Cyber vendors have a tendency to sell the maximum capability of a solution when in actual fact it requires a lot of tweaking to make it suitable for the job and is used to the maximum capability.
This is where the vicious circle can come into play. Skills gap = problem = procure perceived solution = more things to manage without specialist skills = greater problem.
This is where a solution versus service argument comes to the table.
The architecture itself is a risk
Right, stick with us here, it’s a bit of a three-part puzzle.
So firstly, let’s look at the sector. The tenets of higher education institutions are based on collaboration; sharing information, sharing research and that makes it difficult to segment the network and restrict access as granularly as you would in say, a law firm.
Even if you were looking to grant access for a certain time frame based on certain variables, that process is largely left to manual intervention and at scale, mistakes will be made.
This brings us to the 2nd part of the puzzle - the susceptibility of the sector to:
- phishing, due to the perceived behaviour of the users, and
- ransomware, due to its segmentation.
We did some research into students’ usage of university IT and there was general confidence from the students that picking up on scam emails would be easy (we weren’t as convinced), but there was also an assumption that anything from the university is trusted, without consideration towards legitimacy, impact or privacy. We tested this with a question around installing software, suggesting students are also likely to be susceptible to spear phishing.
This brings us to the final piece of the jigsaw - there’s a lack of visibility into the actual real threat. Due to the growth in the digital landscape, paired with largely off-campus (remote or cloud) activity and the squeezing of IT infrastructure and teams to meet the demands of the users, there are so many blind spots and unknowns. This all makes a higher education network extremely vulnerable to attack.
There is often a tendency to gravitate towards advanced cyber security solutions that tackle specific threats, but there isn’t a huge understanding of the overall security posture. Why invest in an advanced technical security solution if you’re not resilient enough to overcome a pay-as-you-go DDoS attack that can be accessed by anyone? Which threat is more likely to be seen?
Now we’ve had a look at some of the challenges, let’s have a look at some practical solutions to mitigate the risks we’ve outlined above.
Higher education cybersecurity considerations to tackle the 2022 threat landscape
Cyber posture assessments
First things first - getting visibility is priority number one.
You need to identify the things you don’t know. If you don’t understand where your knowledge gaps are, how can you possibly create a comprehensive security strategy? This harks back to the point we made around having a lack of visibility into the actual real threat.
Understanding how systems are connected, accessed and used is imperative. You probably already have solutions in place that monitor activity across the network, this data paired with a detailed understanding of network architecture can go a long way to understanding vulnerable areas of the enterprise. Special attention should be given to ‘what if’ scenarios, for example - If this point in the network is compromised, what exactly will be exposed and what is the impact of this exposure?
Ensuring you understand the risk landscape and preparing for worst-case scenarios relevant to you provides a solid foundation to build more advanced cybersecurity practices. Cybersecurity posture/risk assessments can provide a comprehensive analysis of your organisation as well as a prioritised list of recommended remediations to improve your cybersecurity posture.
Endpoint protection - We’ve asked the question.
We’ve heard both sides of the coin on this, should endpoint protection be a prerequisite for university students or is it an invasion of privacy?
We asked a cross-section of students in Cardiff this question and a large majority had no issue at all with software being installed on their devices. In most cases, this response didn’t change when we gave more detail around what the software would do.
We believe that if configured correctly and installed to do a job and that job only, then the benefits are universal, and the students we spoke to seemed to agree.
Having endpoint security in place helps protect students from being victim to cybercrime, which could result in the loss of university work, along with personal data. It also provides peace of mind for the University that those ‘untrusted’ devices connecting to the network have a layer of security in place to mitigate daily cyber threats.
Zero trust - the time is right
Several misconceptions may have put considering a zero trust approach down on the 'to-do' list rather than the 'do now' list. These often include: “It’s too difficult to implement fully”, “It's not user-friendly”, and “It would be difficult to make it work given the nature of higher education” - the list can go on. However…
…it might be just the right thing to do right now.
Let’s explain why. Zero Trust requires change and it’s a marathon not a sprint; it spans users, application and infrastructure. Given the changes that are required in modern day IT due to external influence and digitalisation, there is a lot of change occurring anyway.
The move to cloud-based services rather than on-premises data centres has been on-going for some time, there is also a large shift in infrastructure, how it is managed and where it lives. This is all compounded when paired with the shift to remote learning too.
It’s a busy time but it’s also the perfect time to begin implementing Zero Trust policies, principles, architecture and technology. Sure, it won’t happen overnight, but while organisations are going through such widespread changes, implementing Zero Trust now will likely cause less disruption than waiting and doing it as a project on it’s own.
To recap - Zero Trust is the reverse of most security thoughts on having ‘trusted’ elements to an organisation. With higher education having so many untrusted connections into their network, having a policy of not trusting anything until it verifies itself, makes sense.
Cyber Education
A bit of an obvious one, but the value of education cannot be overstated, especially in higher education.
Having done a little digging, we’ve found that many universities will provide cyber awareness training to staff but not students - why is this?
We appreciate that students are probably going to be less interested in sitting through an hour of “Please don’t do this” and “Don’t stick that in there”, but giving them an idea of what to look for when checking if an email is malicious or not could make a huge impact to your cyber effort.
In the same research we previously mentioned, we also asked each student if they knew anything about their university IT security policy - we had one “yes” (and it was fluffy at best).
As previously mentioned, students have a tendency to trust anything from university, making them susceptible to phishing. Knowing how to check an email sender, hover over links and identify dodgy URL’s could be the difference between a well spotted phishing email or an easily avoided disaster.
Managed Detection & Response (MDR)
Let's face it - it’s a big task securing a university IT ecosystem, especially given the growth of cyberspace, the connections into it, the diminishing visibility, and the challenge of getting the right specialist skills.
Utilising machine learning to bear some of the load is not a bad idea. You can process more data daily, check more transactions, investigate suspicious behaviour and automate routine tasks – consistently and repeatedly and avoid human error.
We did say earlier however that adding in solutions without having a specialist can sometimes bring more problems than benefit. If you haven’t got the in-house team to manage an end point detection and response solution, then the best option is to simply outsource it.
Outsourcing to a third party Managed Security Provider not only allows a university to focus attention on delivering strategy, but it also gives them access to top-of-the-line technology, people, intelligence feeds and reporting.
It’s time to rethink higher education cyber strategy
The quick shift during the pandemic resulted in service continuity being prioritised over security. This paired with the organic growth in the amount of ‘things’ to manage and secure has meant most strategies will be out of date.
Re-thinking your approach based on data, knowledge, insight into consumption, and applying cybersecurity principles that are suitable for modern-day ways of working will help build resilience into higher education establishments whilst allowing world-class learning to take place.
Steve Heneghan
Head of cybersecurity services and operations
Here to help
We've got an hour for you
We appreciate the difficulty faced when trying to secure a network with such variety in demand, from such a variety of locations, devices and users.
We have helped universities tackle challenges for over 15 years and we'd be happy to provide helpful advice.
Take advantage of an hour of free consultancy to get help with your cyber obsticles.
Fill out the form below and we'll be in touch shortly.
Doing right with insight
Instead of a free coffee, answers 5 questions about your role in Higher Education IT and we'll donate £5 to Latch Children's Charity.
UK Sovereign MDR Services
Attacks are becoming more complex and subtle, to stay ahead of cyber threats you need the right technology, skill set, and knowledge.
Managing 30,000+ users
We take a look at some of the challenges service delivery teams face in higher education environments.
HigherEd App Challenges
Does poor IT performance really impact a student’s final grade?
A deep dive into the challenges ensuring performance.