After major data breaches at retailers like Target, Best Buy, Home Depot and Sony Online Entertainment, consumers are largely informed about the risks of using their credit and debit cards and providing other personal information to service providers. But college students, faculty members and alumni often have no choice but to provide their personal information to their institutions—and in growing numbers of cases, that information has also become a target for cyber criminals.
As more private information has become digitized, all sorts of networks have become targets — and higher education institutions may be especially vulnerable. Not only do college and university networks house loads of personally identifiable information about students, faculty, staff and alumni, but they also are home to documentation on cutting-edge research that may be of interest to commercial and governmental interests around the world. That makes them increasingly hot targets for cyber threats.
But colleges and universities are by nature open, collaborative environments. As a result, taking steps to keep the network safe can seem like a conflict of interest with the institution’s very nature.
However, growing numbers of colleges and universities are finding that despite their unique challenges, there are ways to keep their networks safe from intruders and still allow for digital academic freedom. Our new e-book, Data Breach Detection and Defense, is full of examples and insights from experts in the trenches who have fought back against cyber threats and have helped keep campus networks safe.
Download the e-book to learn more about how to keep your network safe while preserving the openness of a thriving higher education institution.
Tuition Management Systems (TMS) is the sponsor of this post. The sources who contributed ideas to this post do not endorse or recommend any commercial products or services, including those of TMS. All information and opinions of the contributors are provided for informational purposes only. As with any other service you seek, the recipient of the information is responsible for conducting appropriate research and making relevant decisions. TMS neither endorses, has any responsibility for, nor exercises control over the views of any contributor to this article or the accuracy of the information provided by any of them.