Most Ed Institutions Unprepared for Data Risks

Nearly four in five, 77 percent, of education institutions are unprepared for IT risks, according to a new survey from Netwrix.

Respondents told researchers that employees are the biggest threat to system availability and security at the same rate, 77 percent and 79 percent said that they do not use any software for information security or risk management.

Other key findings of the survey include:

  • 72 percent of responding institutions reported that they don't have a dedicated employee responsible for IT security;
  • 49 percent of responding institutions said they had experienced security incidents as a result of human behavior, and 37 percent reported incidents resulting from malware;
  • Lack of budget was the most frequently cited reason for not taking a more efficient approach to security, at 74 percent, while lack of time and insufficient participation from senior management were cited by 54 percent and 44 percent of respondents, respectively;
  • The most protected areas, according to respondents, were endpoint (82 percent), on-premises systems (79 percent) and virtual infrastructure (73 percent);
  • The most neglected areas were BYOD (49 percent), unstructured data stored by a third party (33 percent) and employee activity (17 percent);
  • 54 percent of respondents said that downtime was the result of accidental or incorrect user activity;
  • More than a third, 35 percent, of respondents said they had compliance issues in 2016; and
  • Prevention of data breaches and fraud were the most commonly cited focus of future investments, at 49 percent each, followed by intellectual property theft, at 23 percent.

"Typically, IT departments in the educational sector are understaffed and under-budgeted," said Michael Fimin, CEO and co-founder of Netwrix, in a prepared statement. "Nevertheless, they have to support hundreds of users and meet tightening requirements for data protection. To successfully secure sensitive data and maximize system uptime, educational institutions need to gain visibility into user activity across the entire IT infrastructure. Knowing who does what in which system, who has which permissions, who accesses what files and so on will cost-efficiently facilitate security, compliance and operational tasks, as well as simplify dealing with IT incidents."

For more information, visit blog.netwrix.com.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • close-up illustration of a hand signing a legislative document

    California Passes AI Safety Legislation, Awaits Governor's Signature

    California lawmakers have overwhelmingly approved a bill that would impose new restrictions on AI technologies, potentially setting a national precedent for regulating the rapidly evolving field. The legislation, known as S.B. 1047, now heads to Governor Gavin Newsom's desk. He has until the end of September to decide whether to sign it into law.

  • illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

    Report: Increasing Number of Vulnerabilities in OpenVPN

    OpenVPN, a popular open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a new report from Microsoft.

  • interconnected cubes and circles arranged in a grid-like structure

    Hugging Face Gradio 5 Offers AI-Powered App Creation and Enhanced Security

    Hugging Face has released version 5 of its Gradio open source platform for building machine learning (ML) applications. The update introduces a suite of features focused on expanding access to AI, including a novel AI-powered app creation tool, enhanced web development capabilities, and bolstered security measures.