Campus Review Volume 28 - Issue 10 | October 2018 | Page 28

Technology campusreview.com.au Beat the cyber spies Ten inexpensive ways to vanquish cyber spies in higher education. By Michael Hartland J ust a few short years ago, cyber attacks were a barely recognized threat. They felt intangible, unlikely, a concern for the future perpetrated by bored yet technically gifted teenagers. Fast-forward to today and cyber security is the most pressing IT issue for many organisations – including universities and higher education institutions. 26 The motivations behind cyber attacks can range from political to personal, or just plain mischievous. But the risks are far more clear and profound: compromised data, stolen research and reputational damage. The nearly 1200 UK breaches in 2016–17 were double the number of attacks in the sector the previous year. Addressing the cyber threat is imperative for colleges and universities, yet needn’t be complicated or expensive. These 10 areas focus on communications and culture – not big funding or technical systems. It’s time to say goodbye to the cyber spies. 1 Make communication a priority In today’s bustling workplaces, it’s often difficult to get messages through to teaching staff. These people are busy, their inboxes bulge with emails, students place demands on their attention. In this environment, it’s important to have reliable, authoritative IT comms that staff take notice of. A cyber attack which causes a network outage impacts your ability to teach. Advising staff such that alternative measures can be put in place is essential to minimise disruption. Tip: Introduce a communication channel exclusive for high-priority messages. Desktop alerts which pop up on staff computer screens and bypass email are very effective. 2 Reach everyone, everywhere Colleges and universities are dispersed environments. Teaching and administrative staff are located in multiple different faculties and campuses. Contractors are increasingly employed for shorter-term projects. Remote teams connect with central offices through mobile devices. Advising on cyber security best practice, or informing of policy updates, requires aligning all staff – wherever they are, and whatever device they’re using. Neglecting anyone leaves the door open for potential breaches. Tip: Ensure your communications don’t exclude anyone. Increase readership