Independent Schools Portal
  • Home
  • About
  • Professional Development in 2021
  • innovatED Magazine
    • innovatED Issue 1
    • innovatED Issue 2
    • innovatED Issue 3
    • innovatED Issue 4
Picture

Blog Page

IT Security in Education: An overview

2/11/2016

0 Comments

 
Picture

by Mark Lomas

Security expert at Icomm Technologies
The topic of cyber security is increasingly at the top of the agenda for schools, especially with the number of ransomware and other cyber attacks on the rise. According to research from McAfee, ransomware attacks – in which sensitive data is hacked and held hostage by cyber criminals in return for financial payments – have risen more than ten-fold in the last two and a half years.
It used to be that the main concern for schools was simply bedroom-bound hackers testing the limits, carrying out digital attacks simply because they could. Although this raised plenty of threats, in most cases damage would be limited, and attacks from viruses, whilst troublesome, were limited to causing computers to become unreliable or slow.
Nowadays, as educational institutions continue to adopt tools to monitor the behaviour and performance of students, the data held by schools is also becoming increasingly detailed and, therefore, attractive to unscrupulous hackers. And their hacking methods are increasingly sophisticated, having evolved their techniques from the more traditional routes such as malware, worms or viruses, for which IT defences are designed for. ​
In addition, it’s easy for schools to slip in to a ‘fit and forget’ culture whereby security defences – including anti-virus software, software patches and firewalls – are installed but neglected soon after. This includes the need to make regular checks and ensure that software remains up-to-date. By sidestepping this, schools are finding themselves with a number of legacy processes that are simply not sufficient to protect against modern threats.

​The scale of the problem


Ransomware

​Ransomware spreads like a virus, searching for data in the files on your machine and encrypting them; this essentially ‘locks’ them so that you are unable to gain access. And if your computer is part of a network, it will find and encrypt data across your networks and servers. You’ll then be asked to pay a ‘ransom’ to be given the decryption key to unlock your files, often with the additional threat of exposing any personal data to leverage payment.
With this type of attack on the increase, anti-virus software has evolved to include activity monitoring that can protect server data by looking for ‘virus like’ activity on the network and shutting it down. ​
Email security
Phishing is the fraudulent practice of sending emails purporting to be from a reputable source in order to encourage individuals to reveal personal information such as passwords or credit card numbers, or even convince people in charge of funds to move money to a fraudulent account. They rely on users to complete the attack, which is why the solution is not just a good spam filter that’s regularly updated, but also user training to help your users spot potential threats.

Web security and application control
There are several safeguarding guidelines including the KCSiE statutory guidance and Prevent Duty Guidance which have established web monitoring and filtering as mandatory digital safeguarding requirements in schools.
There are a number of things to consider including not just which websites can be accessed, and what sort of content can be downloaded. Categorising websites can make filtering content easier in this situation.

Over 40% of web traffic now encrypted including basic websites like Google. This means that you need a more powerful firewall to scan this traffic to prevent threats getting through.
However, it’s not just websites that are accessed via the internet. Internet enable applications needs to be considered and controlled also, and any malicious software that may have found its way on to your system needs to be prevented from accessing the web.

The final element in web security and access control is having access to good reporting. Knowing what is being accessed online and when, and the ability to monitor activity in real time as well as historic data makes it easier to achieve your statutory requirements and also gain insights that can help you refine your filtering process.

With this type of attack on the increase, anti-virus software has evolved to include activity monitoring that can protect server data by looking for ‘virus like’ activity on the network

Next steps
​

Having the right technology and keeping it up-to-date, alongside user training, is the key to mitigating cyber security risks. This includes a good firewall, a cloud filtering solution or a combination of both. Make certain that PCs have a strong security configuration and prevent the installation of unauthorised software. A regular audit of your systems is recommended to ensure that they are still fit for purpose.
Picture
Having the right technology and keeping it

If you’d like to know more about cyber security, then check out my video series on topics such as email security and ransomware.

And to understand where your security vulnerabilities lie, register for a free* cyber security assessment with a qualified ACE practitioner from Icomm, who will work with you to identify and analyse security issues, and give you guidance on any improvements that are needed to make your network more secure. Register here or call 0121 248 7931.

Mark Lomas is an IT consultant with Icomm Technologies ; a leading provider of managed IT services, pro-active IT support and solutions. With nearly twenty years’ experience, Mark is an accredited NetApp, VMware, Microsoft and Symantec professional, specialising in SAN storage and virtualisation. Working across a variety of areas of systems infrastructure, Mark provides award-winning cloud and managed IT services to large organisations and SMEs alike, helping them save time and money.

*Terms and conditions apply. Qualification phone call required. You will receive up to 4 hours’ consultancy from a qualified ACE practitioner.
0 Comments

    Archives

    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016

    Categories

    All
    2005 Conservative Manifesto
    30 Hours
    3D Classsroom
    3D Printer
    3D Software
    3 For Free
    Adele Bannister
    Adobe Spark
    AEGIS
    Alan Thompson
    Andrew Goff
    Andrew Hammond
    Andy Falconer
    Andy Goff
    Animation
    Ann Marie Christian
    Anti-Bullying
    Anti-bullying Guide
    Antonia Clarke
    Apple
    App Of The Week
    Appraisal
    Assessment
    Assessment Systems
    Autism
    Back To School
    Barry Richardson
    Baseline Assessment
    Beatwave
    Bee Aware Initiative
    Bishops Univerity
    Bishops University
    Blue Apple Education
    Briefing Note
    Buncee
    Bursars
    Buying
    Buying Support Agency
    Cardiio
    Careers
    CAS
    Catherine Lees
    Charity
    Chatterpix
    Child Protection
    Child Support
    Choices
    Chris Forrest
    Christina Gabbitas
    Claas
    Claire Fuller
    Claire Stead
    Classroom Technology
    Clifton School And Nursery
    Clubs
    Code Combat
    Code Studio
    Collaboration
    Collaborative Learning
    Collaborative Purchasing
    Competition
    Competitions
    Compliance
    Computing
    Conference
    Conferences
    Conservatives
    Coopetition
    CoSpaces
    CPOMS
    Creative Writing
    Cundall Manor
    Cyber Cafe
    Cyber-security
    Dan Arnold
    Dan Seneker
    David Goulbourn
    David Horton
    David Paton
    David Winfield
    Department For Education
    Deputy Heads
    Devolve Me
    Dfe
    Difficult Conversations
    Difficult Parents
    Diversity
    Dotty
    Early Years
    Economics
    Ecoschools
    EdShow
    Edtech
    Education
    Educational Fads
    Education Policy
    Education Show
    Election 2017
    Eliziam
    Email
    Emil Willis
    Emma Warner-Reed
    Engagement
    E Safety
    E-safety
    ExamPAL
    Feel Real
    Festival Of Learning
    Finance
    Find Of The Fortnight
    Finnish Education
    Firefly
    Flash Fiction
    Flipped Learning
    Flowing Tales
    Formative Assessment
    Funding
    GBM Digital
    Gender
    Gender Stereotypes
    Globalisation
    Gooseberry Planet
    Governors
    Grammar School At Leeds
    Grammar Schools
    Grants
    Green Paper
    Grief Recovery
    Grieving
    Growth Mindset
    GSaL
    Hannah Wilson
    Heads4Heads
    Headship
    Health And Safety
    Helene Ruda
    Henry Smith
    Higher Education
    Hi Impact
    Hi-impact
    Holmewood House
    Homework
    Hyde Park School
    IAPS
    Icomm
    ICT For Leaders
    Incerts
    Incredibox
    Independent Schools
    Independent Thinking
    Innova
    Innovation
    Inspection
    Inspiring Teaching
    Inspiring The Inspirers
    International Higher Education
    International Study
    Internet
    Internet Safety
    Intrinsic Motivation
    Ishita Mandraka
    ISI
    IT
    Jack Adamson
    Jack Jackman
    James Tooley
    Jo Marsden
    Justine Greening
    Kahoot
    Karen Burns
    KCSIE
    Klick Technology
    Koma Koma
    Kylie Reid
    Lab Furniture
    Leaders
    Leadership
    Learning Environments
    Learning Ladders
    Learning Platforms
    Lego Life
    Leigh McGarvie
    Lily Foundation
    Lisa Ashes
    Literacy
    Little Food Company
    Loss
    Lucidpress
    Maria Brosnan
    Mark Davies
    Mark Doherty
    Mark Lomas
    Maths
    Maths Setting
    Matt Haynes
    Matt Koster-Marcon
    Matt Roper
    Meetings
    Mental Health
    Mike Abraham
    Mike Hargreaves
    Miles Berry
    NAHT
    Networks
    Nicola Clifford
    Nursery
    Nursery Education
    Outdoor Learning
    Outward Bound Trust
    Oxford Home Schooling
    P4C
    Parental Engagement
    Parent Apps
    Parenting
    Parents Tour
    Parent Teacher Relationships
    Partners
    Paul Brewer
    Pedagogy
    Peter Carpenter
    Phil Garner
    Philosophy
    Philosophy-for-children
    Pirjo Suhonen
    Playdemic
    Pobble
    Pokemon Go
    Pownall Hall School
    Premier Education
    Principal Resourcing
    Professional Development
    Programming
    Pupil Progress
    Purchasing
    Radnor House School
    Ransomware
    Recruitment
    Red House School
    Renewable Energy
    Resiliance
    Ross Morrison McGill
    Safeguarding
    Samantha Fisher
    Sam Antrobus
    Sarah Barthorpe
    Saving Money
    Savings
    School Communication
    School Outdoor Learning
    Schools
    Secret Parent
    Self Broadcasting
    Sensavis
    Shadow Puppet
    Sheilds
    Shropshire 3D Print
    Smart
    Smart Technologies
    Smoothwall
    Smootwall
    Snapseed
    Social Media
    Software
    Solar For Schools
    Sonia Gill
    Sonita Alleyne
    SOuL
    Splice
    St Bees
    Stella
    Stella James
    Stephanie Walker
    St Olaves
    Stress
    Stronger Together
    Stuart Bayne
    Student Debt
    Students
    Study In Canada
    Studying In The USA
    Study US
    Supply Teaching
    Sustainability
    TeacherIn
    Teacher Shortages
    Teaching
    Teaching And Learning
    Teaching Ideas
    Tech
    Technology
    Teresa May
    Termly Update
    Thomas Packer
    Three For Free
    Tigtagjunior
    Tigtagworld
    Tiny Tap
    Top Trumps It
    Tracy Gladman
    Twig
    Twig World
    University Funding
    USA University Study
    VEO
    Video
    Video Editor
    Video Enhanced Observation
    Videos
    Virtual Reality
    Viviana Doctorovich
    Wellbeing
    WomenEd
    Wonder Why Society
    Work - Life Balance
    Worrinots
    Yasemin Wigglesworth
    Yes Programme

    RSS Feed

Stay social

Picture
(c) Blue Cow Education Limited 2015-20.  All rights reserved.
  • Home
  • About
  • Professional Development in 2021
  • innovatED Magazine
    • innovatED Issue 1
    • innovatED Issue 2
    • innovatED Issue 3
    • innovatED Issue 4