As seen on eCampus News
Universities should look towards an integrated approach that consolidates cybersecurity functions as much as possible

How to increase security for hybrid education networks

Universities should look towards an integrated approach that consolidates cybersecurity functions as much as possible

By Terry Young, Director, Service Provider Marketing, A10 Networks September 26th, 2022

Well before 2020 and the COVID-19 pandemic taking hold, connectivity played an important role in university life. Universities are hotbeds for ideas and innovation—and also have a nearly insatiable need for connectivity. In recent years, however, connectivity shifted from a mere convenience to a lifeline for students and universities. As these institutions built and expanded online remote access for their students, many from scratch, their IT departments were forced to shift their focus from on-campus networking to supporting a distributed global network to meet the new normal of education.

Although in-person teaching has now seen a welcome return, the wealth of online learning resources available, both on internal and external networks, are an invaluable asset to both teachers and students. Meanwhile, online retail, banking, health services, gaming, media, and more are mainstays of student life.

Now, the global networks established to support day-to-day teaching have encountered another obstacle, as the expanded attack surface attracts growing cybercrime. Attack vectors of ransomware come in the form of malicious emails, compromised websites, and infected file downloads. Schools and colleges all over the world were not immune to nor prepared for the surge in ransomware attacks during the start of the global pandemic. In fact, colleges and universities worldwide experienced a surge in ransomware attacks in 2021, and these attacks had significant operational and financial costs. Not only do schools hold large amounts of personally identifiable information (Pll), but universities, in particular, are frequently home to sensitive research and development data, making them highly valuable targets.

The Continued Needs of the New University

The pandemic was a wakeup call for IT departments in universities: improvisation and a patchwork of legacy infrastructure and security could no longer suffice. Higher education institutions needed a considered plan for moving to a more resilient, on-demand model.

Higher education faces one of the most challenging environments in IT. From proliferating unmanaged devices to spiky traffic patterns driven by class schedules, to highly latency-sensitive applications such as online classes, research, video, music, and gaming, the demands on university IT echo those of a commercial service provider, rather than an enterprise. In meeting these requirements, IT must have a fully developed strategy to ensure high availability, disaster recovery, multi-cloud security, and load balancing.

While the sector reacted as quickly and securely as possible and the shift to online education was a great success in mitigating the disruption caused by the pandemic, the rapidly evolving world of cybercrime means that these same institutions must now reassess their network security.

Securing on-demand education

As the university environment benefits from its recent expansion beyond the campus, these institutions need a cybersecurity model that recognizes that a threat can come from anywhere. The Zero Trust model responds to these challenges by adopting the approach of “trust nobody”— inside or outside the network, making sure that no user has access to data that they don’t depend on for their day-to-day functions. The goal is to restrict access as much as possible and ensure that you have visibility into all your users, traffic, data, and workloads, and that you have uniform security policies applied across all locations to make sure that no security loopholes exist.

Under Zero Trust, which has taken root as a foundational element of modern cybersecurity, cybersecurity strategies are redesigned to follow a set of key principles:

  • Creating network micro-segments and micro-perimeters to restrict traffic flow within the network and limit excessive user privileges and access as much as possible.
  • Strengthening incident detection and response using comprehensive analytics and automation.
  • Providing comprehensive and centralized visibility into users, devices, data, the network, and workflows.

To preserve the growing number of learning platforms and resources accessible online, it is essential to secure them against HTTP and web application-based security flaws. Web application firewall systems use specific knowledge of HTTP and web-application vulnerabilities to filter or block these attacks without ever exposing the web servers or applications. This helps protect the environment against a host of attacks and is a must-have for modern educational institutions.

Automated Distributed Denial-of-Service (DDoS) protection is another critical step in protecting against widespread and easily launched DDoS attacks. Universities should leverage DDoS threat intelligence, combined with real-time threat detection, to defend against DDoS attacks no matter where they originate. Methods such as automated signature extraction and black-listing botnets’ IP addresses and available vulnerable servers create effective, proactive defenses.

Integrated Security Approach

Over the years, most organizations have amassed several legacy-based security point solutions, which address specific threats. These systems – added incrementally as new threats emerge and new approaches are provided – create an increasingly complex system, adding latency into applications and reducing the overall effectiveness of the business’ cybersecurity strategy.

Universities should look towards an integrated approach that consolidates cybersecurity functions as much as possible, in turn allowing these functions to work together seamlessly for unified security and enabling compliance.

While the shift to remote and on-demand learning accelerated by the COVID-19 pandemic, the transformation of higher education had already been well underway. Finance and enrollment operations were already driving universities away from on-premises systems, offering more dynamic options for students to interact with the establishment, regardless of whether they were on-site or not.

But with the exponential growth of online resources in the last two years, the evolution in business models is now clear. What remains is to ensure that universities’ technology stack can support the new direction, maintain availability wherever and however students connect, and ensure the security of its students and employees alike.

About the Author:

Terry Young is Director, Service Provider Marketing, at A10 Networks. She is responsible for developing programs and marketing materials that describe the business value of A10 solutions for mobile network operators and other service providers. Young has more than 20 years’ experience in the telecommunications industry, including at AT&T (mobile and fixed businesses), where she developed market strategy recommendations for new business initiatives for AT&T. As a principal analyst for a syndicated market research company early in the 3G technology introduction, her 3G/4G market analysis and forecasts were published by the UMTS Forum. Young previously held positions with several start-up mobile infrastructure and software vendors, including Infoblox and Palo Alto Networks. She has an MBA from Arizona State University.

eSchool Media uses cookies to improve your experience. Visit our Privacy Policy for more information.

Looking for some help?

Would you like to have an eSchool Media team member contact you?

Leave your details for more information