skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Ovum view

Summary

A former student at the University of Iowa has been arrested for installing keyloggers on campus computers to record his professors’ keystrokes, gaining information to improve his grades 90 times in 21 months. The case highlights the need for more attention on insider threat in higher education.

Higher ed has unique IT security challenges

Colleges are keen to maximize wireless access across campus but don’t necessarily abide by wireless security rules, and even if they do, a lot of users are not aware of these rules, making their machines susceptible to becoming wireless bridges. Add in the fact that the internet has shredded notions of personal privacy, while cutting and pasting has seriously undermined the concept of plagiarism, and you begin to see the extent of the problem.

The Iowa case should give institutions pause. A tech-savvy kid gamed the system, and colleges must guard against such insider exploits. In this case, the miscreant was discovered, perhaps because of his sheer persistence or lack of knowledge about existing monitoring systems, but imagine a scenario where the misbehavior was more widespread, benefiting multiple students, and was only discovered much later. Imagine having to recalibrate all degrees awarded for an entire year, three years after data theft took place, for instance.

Security teams cannot rely on the professors, who may be Nobel Prize winners in their fields but won’t necessarily have a clue about IT security, so technology is needed to detect and remediate. Endpoint detection and response (EDR) technology, part of a broader endpoint protection platform (EPP), needs to be in place.

College IT teams are doing their best with the small amount of security resources available, but small teams and small security budgets are always going to hinder their efforts.

Appendix

Author

Rik Turner, Principal Analyst, Infrastructure Solutions

rik.turner@ovum.com

Recommended Articles

  • Internet of Things

    IoT Viewpoints 2018

    IoT Viewpoints explore the IoT opportunity in 2018 and beyond. Download our latest e-book to get our newest collection of thought leadership articles on the emerging IoT trends, technologies and opportunities.

    Topics IoT

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

  • Enterprise Services

    5G: Another technology in search of enterprise use cases

    By Evan Kirchheimer 26 Apr 2018

    Service provider interest in justifying 5G investment through its potential to open new revenue streams from the enterprise segment is growing ever greater.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now