Like security technology, security skills and knowledge require continuous updating to be effective. With new risks and threats emerging daily, IT professionals in education have to balance the responsibility of keeping technology running smoothly with the demands on time and resources created by the need to continuously work to protect the network.
Three questions are key to gauging the capability of internal resources for managing security:
- Is the IT team able to continuously keep up to date with new and emerging cyber threats and risks?
- Are they able to continuously update, integrate and rapidly test new security patches and afford new technology when appropriate?
- Are they able to continuously adopt a proactive defense strategy and provide leadership for appropriate security practices among students, faculty and administration?
The education sector is particularly challenged by finding, hiring and retaining IT staff with extensive security skills – which is why establishments should consider externalizing network security services to take advantage of dedicated and current expertise supported by state of the art security technology.
The IT HR challenge
While the education sector struggles with IT recruitment and retention, it makes sense to consider how best to cope with the twin challenges of harnessing the advantages of technology and providing protection against the risks and threats that technology can introduce.
By separating the challenges, you can begin to see the advantages of externalizing network security services. These include:
Freeing up IT staff to focus on IT delivery and support
Reducing the cost of regular security knowledge and skills training
Access to world-class security insight and expertise
Predictable security resource costs
Integrating with security as a service
Security isn’t a ‘one size fits all’ solution. While there are some common features of cyber attacks and risks between K-12 schools and Higher Ed establishments, other factors will also determine the right blend of internal and external security skills, technology and solutions. Legacy investments and future objectives are also key to any security strategy going forward.
The first step is assessment.
With the aim of practicing ‘defense in depth’, AT&T can conduct an assessment of activity, resources, existing technology and solutions and then make recommendations which can help you take advantage of a variety of network security solutions
AT&T security solutions are carrier-agnostic, meaning you can take advantage of these services regardless of who provides your network or Internet services.Find out more about the AT&T security services portfolio Request threat vulnerability analysis
Safeguarding campus networks from DDoS attacks
As Distributed Denial of Service (DDoS) attacks on campus networks become increasingly common, higher-education technology leaders should consider investing in a solution that safeguards their networks from these debilitating attacks.
A DDoS attack occurs when a hacker takes control of several computers and aims them at a single server, overwhelming that network with traffic and ultimately knocking it offline. DDoS attacks can be very disruptive to teaching, learning, communication, and other day-to-day operations at colleges and universities.Download DDoS attacks on campus PDF