Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

From home-grown talent to a legislative nightmare: Why educational institutions must act like businesses

by The Gurus
November 18, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

From connected devices to virtual reality, technology is now giving students the ability to transform and design the way in which they choose to learn, not only from where, but also how. For example, students can now work from almost anywhere, using various applications and connected devices to enhance remote learning. Students are now increasingly known to use this technologically enhanced environment to create their own applications.
Mark Zuckerberg is a famous example of this, with his creation of Facebook whilst studying. It is uncommonly known however, that prior to this he created ‘CourseMatch’, which allowed students to select classes and form study groups. Zuckerberg then went on to create ‘FaceMash’, the precursor to Facebook, which accessed the university database to allow students to rate fellow class mates on attractiveness. Whilst apps, such as ‘CourseMatch’ can be extremely beneficial to the productivity of students, they also open the doors to many potential risks, for example transforming the education environment into a breeding ground for Shadow IT. 
Students vs. Shadow IT
Shadow IT, which is often used to describe the vast volume and variety of applications that have worked their way into an IT ecosystem, has been overwhelming IT teams in the business realm for a number of years now.  However, this is now also becoming an issue, not only born straight out of students’ dorm rooms but just as commonly by university lecturers and researchers who creating these new apps. This raises a huge cause for concern, as educational establishments, particularly universities, produce an overwhelming amount of data, which is now being handled by individuals with no foresight or experience of dealing with data.
Whilst the use of innovative and open sourced apps can prove to be beneficial to students’ productivity, the use of such apps raises a cause for concern in terms of ensuring compliance with legislations. In particular, the EU General Data Protection Regulations (GDPR) which has a deadline of May 25th 2018, will require institutions to ensure information, no matter what form, is managed in accordance with current legislation. Such guidelines are in place to protect institutions with a hoard of sensitive data and Intellectual Property; yet blissfully unaware students could potentially expose sensitive data to a mass of preventable risks. 
On boarding and off boarding students
In business, employees can be the weakest link when it comes to data security – this is no different with students and faculty. Educational establishments, just by the nature of their business, retain the highest turn over compared to any sector, with thousands of new students enrolling and graduating every year. This rapid on and off boarding of students can have the enrolment and IT departments in chaos. Not only does enrolment need to make sure that each student, both new and existing, have schedules ready for the beginning of term, the IT department also needs to make sure each individual is able to access the appropriate systems to start effectively from day one. Both departments must be safe in the knowledge that when a whole year graduates, they cannot take valuable data with them. The reality is that a huge amount of administration is still being done manually and has highlighted the urgent need for procedures to be put in place to educate students on the handling of sensitive data during and post-graduation.
 Eliminating risk
University, for most, is the final stepping stone before entering the corporate world and whilst shadow IT is encouraged within education to both aid productivity and creativity, educational institutions need to start thinking like businesses in order to prepare students for the working world. With systems such as Identity and Access Management in place, harmony can be achieved, to reflect the internal policies and practises of a corporate environment, students can be placed in good stead before embarking on their professional careers.
Embracing solutions such as IDaaS, multi-factor authentication and user provisioning, will allow institutions to keep the benefits but eliminate the risk. These solutions will allow students to freely use applications and minimise the drain on IT resources, encouraging the many beneficial aspects of shadow IT presented by students, while empowering IT teams to ensure these systems are secure and compliant.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Forcepoint™ Unveils 2017 Cybersecurity Predictions

Next Post

Lastline Expands Effort to Defend Large Enterprises from Advanced Malware

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information