Most Ed Institutions Unprepared for Data Risks

Nearly four in five, 77 percent, of education institutions are unprepared for IT risks, according to a new survey from Netwrix.

Respondents told researchers that employees are the biggest threat to system availability and security at the same rate, 77 percent and 79 percent said that they do not use any software for information security or risk management.

Other key findings of the survey include:

  • 72 percent of responding institutions reported that they don't have a dedicated employee responsible for IT security;
  • 49 percent of responding institutions said they had experienced security incidents as a result of human behavior, and 37 percent reported incidents resulting from malware;
  • Lack of budget was the most frequently cited reason for not taking a more efficient approach to security, at 74 percent, while lack of time and insufficient participation from senior management were cited by 54 percent and 44 percent of respondents, respectively;
  • The most protected areas, according to respondents, were endpoint (82 percent), on-premises systems (79 percent) and virtual infrastructure (73 percent);
  • The most neglected areas were BYOD (49 percent), unstructured data stored by a third party (33 percent) and employee activity (17 percent);
  • 54 percent of respondents said that downtime was the result of accidental or incorrect user activity;
  • More than a third, 35 percent, of respondents said they had compliance issues in 2016; and
  • Prevention of data breaches and fraud were the most commonly cited focus of future investments, at 49 percent each, followed by intellectual property theft, at 23 percent.

"Typically, IT departments in the educational sector are understaffed and under-budgeted," said Michael Fimin, CEO and co-founder of Netwrix, in a prepared statement. "Nevertheless, they have to support hundreds of users and meet tightening requirements for data protection. To successfully secure sensitive data and maximize system uptime, educational institutions need to gain visibility into user activity across the entire IT infrastructure. Knowing who does what in which system, who has which permissions, who accesses what files and so on will cost-efficiently facilitate security, compliance and operational tasks, as well as simplify dealing with IT incidents."

For more information, visit blog.netwrix.com.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • cloud and circuit patterns with AI stamp

    Cloud Management Startup Launches Infrastructure Intelligence Tool

    A new AI-powered infrastructure intelligence tool from cloud management startup env0 aims to turn the fog of sprawling, enterprise-scale deployments into crisp, queryable insight, minus the spreadsheets, scripts, and late-night Slack threads.

  • human figures surrounded by precise arcs with book and gear icons

    Kennedy-King College Rolls Out Holistic Student Support Program

    Chicago's Kennedy-King College is expanding student support services through a collaboration between City Colleges of Chicago and One Million Degrees (OMD), a Chicago-based nonprofit serving low-income community college students.

  • college students in a classroom focus on a silver laptop, with a neural network diagram on the monitor in the background

    Report: 93% of Students Believe Gen AI Training Belongs in Degree Programs

    The vast majority of today's college students — 93% — believe generative AI training should be included in degree programs, according to a recent Coursera report. What's more, 86% of students consider gen AI the most crucial technical skill for career preparation, prioritizing it above in-demand skills such as data strategy and software development.

  • laptop and fish hook

    Security Firm Identifies Generative AI 'Vishing' Attack

    A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.