Survey: Third-Party Risks to Networks, Data Remains an Unmet Challenge

IT practitioners in the education sector report that vendors' access to and handling of sensitive data is often unmonitored.

A spring 2022 survey of IT professionals in the education sector by access management provider SecureLink found that many educational institutions are neither managing nor monitoring third-party vendors with access to campus networks and student data.

According to the survey results from IT practitioners in the U.S. education sector, shared with Campus Technology by SecureLink, showed that almost half of education respondents, 45%, reported that they do not evaluate the security and privacy practices of third parties before their organization engages them and begins providing access to sensitive or confidential information, while 51% said they do conduct such evaluations.

The full survey report, "Treading Water: The State of Cybersecurity and Third-Party Remote Access Risk," covers responses from 632 IT and security professionals across five sectors in the United States — financial services, healthcare, education, industrial and manufacturing — who are involved in their organizations' approach to managing third-party data risks, SecureLink said. The research was conducted by Ponemon Institute on behalf of SecureLink earlier this year.

The survey responses show that "organizations have made no significant progress in mitigating cyberattacks and have, in fact, experienced an increase in third-party attacks over the past year," SecureLink said in the report.

Survey participants from education organizations included both K–12 and higher ed IT practitioners, a spokesperson told Campus Technology.

Key Findings from the Education Sector

When asked whether their organization has experienced a data breach or cyberattack caused by a third party vendor, either directly or indirectly, 42% of education respondents said yes, and 2% marked "unsure."

Of those responding yes, over half, 54%, indicated that the breach or cyberattack had not resulted in changes in their organization's third-party management practices.

More than a third of education respondents, 36%, rated their organization as ineffective at mitigating remote access third-party risks. Only 17% of respondents felt confident in their effectiveness at mitigating such risks.

Detecting third-party remote access is also out of reach for nearly four in 10 respondents, with 39% rating their organization as ineffective at detecting remote access third-party risks.

Controlling third-party access to the network is managed only slightly better, the survey showed, with 29% of respondents rating their ability to control network access as ineffective, and just 25% saying their organization was "highly effective" at controlling access to their networks.

When asked to select the five biggest factors considered when making improvements to their cybersecurity infrastructure, the top responses were:

  • 60% reported system effectiveness issues (high false positive);
  • 60% reported in-house expertise;
  • 57% reported system complexity issues;
  • 46% reported hardware requirements; and
  • 46% reported system performance issues.
SecureLink survey

Sixty-three percent of respondents reported lack of oversight or governance as the most significant barrier to achieving a strong security posture in their organization's cybersecurity infrastructure. Other challenges included:

  • 55% reported insufficient visibility of people and business processes; and
  • 49% reported insufficient assessment of cybersecurity risks.

Education IT practitioners reported little or no confidence that their third-party vendors would notify them if they had a data breach involving their organization's sensitive and confidential information: Almost a quarter of respondents said they were "not at all confident," and only 14% answered "highly confident."

  • Only 16% of respondents said their third parties are "all aware" of the data breach reporting regulations their organization must comply with.
  • 52% said their organization does not have a comprehensive inventory of all third parties with access to its network. 44% said they did, and 4% were unsure.
  • 51% said they do not monitor third parties with access to your organization's sensitive and confidential information monitored.

Respondents were asked what information their organization routinely collects and documents about its third-party vendors with access to its network and data:

  • 76% relevant and up-to-date contact information for each vendor;
  • 58% identification of third parties that have our most sensitive data;
  • 43% confirmation that specific security practices are in place (i.e. firewalls, employee security training, pen testing, etc.);
  • 40% confirmation that basic security protocols are in-place;
  • 39% the type of network access they have;
  • 34% past and/or current known vulnerabilities in hardware or software; and
  • 57% of respondents said their education organization's third-party management program does not define or rank levels of risk.

Of the 36% of organizations that do rank levels of risk within third parties accessing campus networks/data, respondents offered the following red flags as indicators of risk:

SecureLink survey

When asked about the steps organizations take to ensure third parties' compliance with privacy and security regulations, 59% of respondents said they encrypt transmissions for all open or public networks. But only 18% had a policy in place banning the use of vendor-supplied security parameters or default passwords. Other strategies in place included:

SecureLink survey

SecureLink's report recommended that organizations reduce the complexity of their cybersecurity infrastructure, improving internal governance, and enhancing oversight practices.

Learn more about the findings and recommendations at SecureLink.com.

Featured

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • close-up illustration of a hand signing a legislative document

    California Passes AI Safety Legislation, Awaits Governor's Signature

    California lawmakers have overwhelmingly approved a bill that would impose new restrictions on AI technologies, potentially setting a national precedent for regulating the rapidly evolving field. The legislation, known as S.B. 1047, now heads to Governor Gavin Newsom's desk. He has until the end of September to decide whether to sign it into law.

  • illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

    Report: Increasing Number of Vulnerabilities in OpenVPN

    OpenVPN, a popular open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a new report from Microsoft.

  • interconnected cubes and circles arranged in a grid-like structure

    Hugging Face Gradio 5 Offers AI-Powered App Creation and Enhanced Security

    Hugging Face has released version 5 of its Gradio open source platform for building machine learning (ML) applications. The update introduces a suite of features focused on expanding access to AI, including a novel AI-powered app creation tool, enhanced web development capabilities, and bolstered security measures.