IT Security: Does it make the Grade?

Straw poll finds IT security a priority in higher education—albeit an underfunded one.

Campus  Briefs

THE 2005 REPORT CARD
Security Element Grade
Administration Priority A–
Faculty Support B
Student Support C–
Administration Support B+
Funding C
Staff Time C
Overall Security Profile B–
While administration and faculty commitment to IT security earned high scores, funding and staff time allocations received lower marks, as did student support. Source: “CDW-G Higher Ed Security Report Card 2005.” Used with permission.

CDW-G has released the results of its informal 2005 sampling of 102 higher education IT professionals on the topic of IT security. In an attempt to understand barriers to improving IT security on campus, survey questions were designed to gauge levels of support by administration, faculty, and students for IT initiatives, as well as to examine administrative prioritization, staffing, and funding. Researchers assigned “grades” based on participant responses, and CDW-G issued a “report card” for 2005.

A’s and B’s for faculty and administrators. Among the key takeaways from the brief study is that IT security is not “counter to the culture” in higher education: 69 percent of respondents characterized it as a top or very high priority for administrators, 73 percent said that faculty support security policies, and 87 percent reported that security policies are supported by their executive administration. Clearly, IT security makes the grade as a priority in higher education institutions.

Funding, staffing, and students get C’s or lower. Despite the priority recognition of IT security on campus, lack of funding is a significant barrier to improving security—identified by 50 percent of respondents as their biggest barrier. And the organizational resource picture looks even worse when coupled with scarcity of staff: 12 percent of respondents pointed to “too few staff” as their own institution’s biggest barrier to security gains. The lowest score, the C- given to student support, is in large part attributed to lack of awareness, rather than lack of regard—a situation that’s possibly also related to a need for more staff attention.

For the record. Organizational resource allocation clearly did not match the high priority and recognition given to IT security by higher education IT professionals and faculty in 2005. This year, CDW-G plans to perform a more extensive study, following up on key findings from 2005 data. Will the grades, particularly for funding and staffing, improve?

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.