<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Universities Beware: Attackers Are Getting Savvy with Fake Cyber Security Courses

spy-privacy-data-surveillance-fotolia_searchsitetablet_520X173

Is your university protected? Iranian hackers attempted to attack U.K. universities with fake, government-certified cyber security courses. They accessed at least one college account.

Main Takeaways:

  • Universities have unique security challenges from an extremely open environment where people can bring whatever devices they want to being targets of nation-state threats against the infrastructure. Often, they cannot put standard security tools on devices as they may not own or have a right to modify them.
  • Those devices still need to communicate over the network which means they can be protected by firewalls and DNS servers. Even in BYOD environments, systems get their configuration from the network, including the DNS resolvers they will use.
  • By integrating threat intelligence on the network, both in firewalls and in DNS resolvers, you not only fully utilize your existing tools (and don’t have to buy more appliances), you can achieve a measure of protection and control against devices that aren’t otherwise managed.

ThreatSTOP protects universities from these types of attackers. Here's what University of Baltimore has to say about us. 

 

Want to check us out for yourself? Try us out for 14 days, free

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter