Report: Ed Sector Leading Target of Malware Events

More than one third of all malware events in 2014 happened within the education sector, according to NTT Com Security's 2015 Global Threat Intelligence Report (GTIR).

The report, which analyzed more than 6 billion attacks for trends, points to the rise of bring-your-own-device (BYOD) programs. "[C]onnecting large amounts of users to public networks through a variety of devices (laptops, tablets, smartphones), cyber criminals know to target this vulnerable audience segment, resulting in this sector having the most detected malware-related events," according to a news release. "Students and staff use these vulnerable networks to check grades, schedule meetings, log into financial assets and more, opening up their personally identifiable information to criminals."

"The history of open networks at education institutes has resulted in network architectures where there is usually no strong separation between areas containing sensitive data and untrusted areas where professors, students or visitors can connect," said Chris Camejo, director of assessment services for NTT Com Security U.S., in a prepared statement. "This makes it more difficult to prevent, detect and respond to attacks. IT officials must develop a strategy that is custom to the BYOD culture that they have embraced."

The full report is available at nttsecurity.com.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • open laptop in a college classroom with holographic AI icons like a brain and data charts rising from the screen

    4 Ways Universities Are Using Google AI Tools for Learning and Administration

    In a recent blog post, Google shared an array of education customer stories, showcasing ways institutions are using AI tools like Gemini and NotebookLM to transform both learning and administrative tasks.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Launches Stand-Alone AI App

    Meta Platforms has introduced a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.