Modern Australian
Times Advertising

Universities are a juicy prize for cyber criminals. Here are 5 ways to improve their defences

  • Written by Ivano Bongiovanni, Lecturer in Information Security, Governance and Leadership / Design Thinking, The University of Queensland

Universities worldwide are a growing target for hackers. A July 2020 report by cybersecurity company Redscan found more than 50% of UK universities recorded a data breach in the previous 12 months.

More recently, a data breach has affected 444,000 users of ProctorU. Universities, including several Australian ones, use this online tool to supervise students sitting exams from home. Personal records from ProctorU were made available on hacker forums.

Read more: ANU will invigilate exams using remote software, and many students are unhappy

The online-first approach universities are adopting during the COVID-19 pandemic further increases their digital footprint. This was done at very short notice. This meant risk analysis was different from the traditional processes, leading to additional cybersecurity risks.

Why do unis attract attacks?

Why are universities such attractive targets? It basically boils down to higher education’s “bread and butter”: they hold precious data, information and knowledge. Typical examples include emails, personal information, technical resources, sensitive research data and intellectual property.

In addition, universities have attractive infrastructure – such as high-bandwidth connections via high-capacity wiring – and access to expensive resources. Their structures and processes are also inherently complex.

All of these factors make them vulnerable.

In a recently published research paper, we sought to disentangle this complexity. We interviewed 11 cybersecurity and IT leaders in universities and research centres across Australia. We asked them about the main cyber challenges their institutions faced daily.

Challenges everywhere

University IT systems host a variety of users, including academics, professional staff, students and visitors. They have different levels of knowledge and understanding of cybersecurity and could create vulnerabilities, albeit unwillingly.

At the same time, they have work to do and they sometimes feel security controls hamper their productivity. One interviewee said:

We regularly get pushed back by researchers saying: ‘Your controls are too tight; we can’t run software or do the experimentation we want to do.’

Illustration of hacker working at laptop Legacy systems at highly connected universities make them vulnerable to hackers. Pixabay

Universities are hyper-connected organisations, whose edges are hard to establish: the boundary is no longer simply “the campus”.

Most universities also have to deal with old technology and networks. Once connected to the internet, these legacy systems may offer so-called “backdoors” that hackers can exploit. The hacking of the Australian National University and resulting data breach was an example of this.

Read more: 19 years of personal data was stolen from ANU. It could show up on the dark web

Universities increasingly operate as businesses. They connect with industry partners and third-sector organisations to make an impact on the “real world”. They outsource some of their services and develop entrepreneurial branches in the form of start-ups and spin-offs.

These activities create further complexity, as universities’ value chains are extended to involve other universities, private and public organisations and non-government organisations. A breach in one component of these value chains could have devastating effects on the other components.

Last but not least, universities have a natural inclination towards innovation. To innovate, information-sharing is essential. This, together with academic freedom, may at times clash with a culture of security. As one interviewee said:

The boards of directors are looking at growth, and there is no growth without risk.

It’s all about protecting intellectual capital

Intellectual capital is the mix of human capital (the knowledge of individuals), structural capital (systems, processes and technology to organise knowledge) and relational capital (the value that comes from connections with the external world). Protecting data and information held in universities ultimately means protecting their intellectual capital.

This cannot be achieved without bearing two levels of embeddedness in mind: vertical (the different end-user categories) and horizontal (the different organisations that engage with universities).

Universities are a juicy prize for cyber criminals. Here are 5 ways to improve their defences Intellectual capital protection in universities and levels of embeddedness. Author provided

Once more, this teaches us that, in cybersecurity, a one-size-fits-all approach is rarely the best solution. Even more so for universities.

Governments are acutely aware of the issues. The recently launched Australian Cyber Security Strategy dedicates A$1.6 million over ten years to enhancing the cybersecurity of universities.

Will this be enough? More money for higher education could come from critical infrastructure protection, joint cyber security centres and perhaps defence, through programs such as the Defence Industry Security Program (DISP).

Read more: Australia’s cybersecurity strategy: cash for cyberpolice and training, but the cyberdevil is in the cyberdetail

What can unis do to improve cybersecurity?

Here are some suggestions:

1. Engage with all end users. Making cybersecurity easier to understand for academics, researchers, students and other users helps make them part of the solution. Engagement goes a long way towards changing people’s behaviours.

2. Share information. Analysis of past breaches and chains of events – like the analysis by the Australian National University – can help other universities improve security and repel attacks. This improves cybersecurity for all.

3. Couple technology investment with investment in people. Universities such as Monash, Deakin and the University of Queensland have recently required multi-factor authentication by users. Legacy systems, where possible, should be replaced or retired, but training and awareness also have to be refined, improved and personalised.

4. Establish coalitions of universities to counter common cybersecurity challenges. This is especially important for universities that have limited resources to tackle the scourge by themselves.

5. Understand your assets. Whether holistically as intellectual capital or specifically as data, information and knowledge assets, a better understanding helps focus investments effectively and efficiently.

This article was co-authored by Dr David Stockdale, AusCERT Director and Deputy Director of Infrastructure Operations Information Technology Services at The University of Queensland.

Authors: Ivano Bongiovanni, Lecturer in Information Security, Governance and Leadership / Design Thinking, The University of Queensland

Read more https://theconversation.com/universities-are-a-juicy-prize-for-cyber-criminals-here-are-5-ways-to-improve-their-defences-144859

How A Cardboard Box Manufacturer Supports Modern Packaging Needs

Packaging has become an essential part of modern business operations across retail, manufacturing, logistics, and e-commerce industries. Many busine...

How Pallet Racking Helps Businesses Improve Warehouse Operations

Efficient warehouse management depends on reliable storage systems that support organisation, safety, and productivity. Many businesses use pallet rac...

Why I/O Controller Is Essential For Efficient Industrial Automation Systems

Modern industrial systems rely heavily on automation and precise data exchange, which is why an I/O controller plays a critical role in ensuring sm...

Why Modern Traffic Management Systems Are Important For Safer Roads

Cities and industrial facilities increasingly rely on advanced Traffic Light System technology to improve road safety, traffic flow, and operationa...

How Structured eCommerce Web Design Influences Online Buying Behaviour

A strong online presence begins with effective eCommerce web design that prioritises both functionality and user experience. Businesses entering or...

What People Mean by “Alternative Doctor” And Why Expectations Around Care Are Changing

When people search for an “alternative doctor,” they’re usually looking for something specific, even if they haven’t fully defined it yet. I...

Why Does My Power Keep Tripping? Common Causes Explained by Electricians Sydney

The electrical system is the lifeblood of your home, powering everything from your phones to cooking utensils and more. But from time to time, your po...

Interstate Car Transporter Urges Buyers to Book Early

As the conflict in the Middle East continues to put increasing pressure on local fuel supply, Australian transport companies are experiencing increasi...

Digital Minimalism for Business Owners: Fewer Tools, Better Systems

Be honest. How many apps are open right now? One for scheduling, another for invoices, a third for customer notes, plus a spreadsheet someone email...

The Importance Of Proactive NDIS Renewal Preparation For Sustaining Your Provider Business

Your NDIS renewal notice is not a signal to start preparing. By the time it arrives, preparation should already be well underway. For new providers, s...

Why Fire Extinguisher Testing in Sydney Is Becoming a Records Game, Not Only a Maintenance Job

A fire extinguisher used to feel like one of the simpler parts of building safety. It hung on the wall, wore a service tag, and sat there quietly unle...

The Switchboard Upgrade Question Every Melbourne Renovator Should Ask Before the Walls Close Up

Renovations have a funny way of making people think on surfaces first. Splashback, stone, joinery, tapware, paint. Fair enough too. That is the exciti...

Winter Sanitation Gaps in Parramatta Kitchens: A Hidden Pest Risk

Winter brings a host of changes to our homes, from the chill in the air to the cozy warmth indoors. However, this season also introduces sanitation ch...

When to Seek Advice from Employment Lawyers in Melbourne

Australian employment law is detailed and, at times, complex, with rights and obligations that aren't always obvious to employees or employers witho...

7 Benefits of Professional Gutter Cleaning for Australian Homeowners

Gutters aren't exactly glamorous. They sit up there on the edge of your roof, doing their job quietly - until they stop working. Clogged, overflowing ...

Pipe Floats Strengthening Pipeline Performance In Demanding Environments

Pipelines often travel through environments that are anything but predictable, water currents shift, terrain changes, and materials keep moving unde...

Why Ceiling Fans Are Essential For Comfort, Efficiency, And Modern Living

Creating a comfortable indoor environment is not just about temperature; it is about how air moves, how a room feels, and how efficiently energy is ...

Why Duct Cleaning In Melbourne Is A Smart Investment For Healthier Living Spaces

Behind your walls, ceilings, and vents lies a network quietly working every day to keep your home comfortable. Yet over time, this system can become...