Iowa College Learns Education & Policies Are Keys to Endpoint Security

  /     /     /  
Publicated : 22/11/2024   Category : security


Iowa College Learns Education & Policies Are Keys to Endpoint Security


Northeast Iowa Community College decided to deal with data breaches by improving endpoint security through a combination of better software, better education and better policies.



When Bob Kennedy first started working within the IT department at Northeast Iowa Community College, cyberattacks were an ongoing and troubling occurrence.
With three campuses spread out across Iowa -- Calmar, Dubuque and Peosta --
NICC
has about 8,000 students, plus 1,200 staff, with Kennedy and his fellow IT and security team members responsible for nearly 3,000 different endpoints, mostly in the form of physical machines, but theres some virtual machines mixed in as well.
Those devices are under direct control. However, with most people bringing one to three devices onto campus, there could be up to 12,000 other endpoints hitting the network, mostly in the form of wireless devices, such as laptops, smartphones and tablets, but Kennedy and his team are also seeing other types of wireless devices hit the network as they grow in popularity.
Additionally, in keeping with its mission of open dialogue and freedom to share ideas among students, staff and colleagues, NICC doesnt block many websites, which complicates the issue even more.
NICCs Dubuque campus

(Source:
NICC
)
Schools are targeted often with cyberattacks and we were no exception, Kennedy told Security Now in a telephone interview. So, it finally came to light that we cant continue this.
Its not only higher education. Endpoint security itself is getting much more complicated with more and more employees, students and people in general using many more devices. In addition, endpoints are no longer only PCs, USB drives and smartphones, but seemingly forgotten hardware, such as point-of-sales machines and increasingly, Internet of Things sensors. The so-called attack surface has grown at NICC as well as students bring different devices onto the network.
Endpoint challenges
As in most cases, those cybercriminals or attackers exploiting endpoints are trying to get their hands on data, whether its to steal money or identifications, or something deeper, such as gaining access to sensitive intellectual property.
Colleges are being hit. Not just our college, but colleges nationwide are being hit because of the sensitive information that we carry as far as students information and the amount of funds that are passed through, said Kennedy, whose title is network technician, but that only begins to describe his other host of duties besides security. What they are trying to do is, whoever is trying to hack the colleges, they are trying to get into that sensitive information.
In November, the
Ponemon Institute released a study
based on responses from 665 IT security executives, which found that over half -- 54% -- experienced an endpoint attack, with some of these breaches running close to $5 million to recover from.
Verizon Enterprise Solutions annual Data Breach Investigations Report also found an uptick in data breaches tied to exploited endpoint devices, especially new ones such as PoS and IoT devices. (See
Data Breach Increase Shows Endpoints Are Under Attack
.)
While not as big as some of the enterprises highlighted in these studies, Kennedy and his team faced many of the same concerns, as well as obstacles. Plus, NICC doesnt have the luxury of an IBM, which could outright ban USB devices to help shore up its own endpoint security. (See
IBMs USB Ban Earns Some Praise, Some Skepticism
.)
More education
What Kennedy and his team attempted to do first and foremost is education. Thats the best front-line defense, especially for students looking to download software thats not approved.
Most of the time the software they try to install has nothing to do with the college. We stop that... Sometimes the user may be injecting some viruses or some bad stuff into our network, unintentionally, and not knowingly, Kennedy said. Thats the biggest task, is trying to educate students and staff as to how to protect themselves and protect our network. We have to take that extra step to make sure that that doesnt happen.
Even with the additional education, Kennedy and his team would still run into problems, mainly from students wanting to download software.
What was happening is that students were bringing in flash drives and somehow running executables or they were bringing in software and the USB was not being scanned so there were some viruses embedded in these documents, Kennedy said. Like Word documents or PDFs or something like that. The antivirus that we were using at the time was not catching it.
Better tools
To counter that trend, Kennedy invested in new antivirus software, specifically security tools and protection from
Bitdefender
, as well as rewriting policies to adjust to the threat landscape.
The Bitdefender software then allowed Kennedy to set policies throughout the campus network, which gave his team greater visibility.
Bob Kennedy of NICC
(Source:
NICC
)
Ill give an example. For PCs, we have policies and one is that the USB is scanned. They cannot attempt to run any executable from a USB or any [other] executable, Kennedy said. Even if there is one on the PC and someone who doesnt have adequate credentials tries to run it, it wont allow it. Number two is that I get notifications of when this happens. So, if a student is like hammering on this PC they are trying to get the stuff, I can remove it and say, Look, please stop this. And hopefully prevent that.
From there, Kennedy is working to expand policies into more end devices, such as smartphones and laptops that students are increasingly bringing onto the campus and into the network. Here, the idea is to use Bitdefenders software to expand antivirus protection throughout the network so even if the device is not secure at least the network is.
Boost your understanding of new cybersecurity approaches at Light Readings
Automating Seamless Security event
on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!
The NICC staff also must prepare for when outside businesses use the campus for training purposes and other corporate events. Here, the IT department sets up a separate VLAN that allows them to bring new devices onto the network, but keep those in isolation from the main campus network.
Again, Kennedy goes back to the theme of education, which starts at orientation for new students and staff and continues through reminder emails sent out from IT and security. However, not everything can be covered.
As long as we keep educating the users we are going to minimize the risk tremendously, actually, Kennedy said. The user is the best defense... thats where we fall short. If theres going to be one way that something is going to happen to our network, it is probably going to be mostly likely, I would say 95% of the time, its going to be because of user error.
Related posts:
Wi-Fi Alliance: WPA3 Standard Will Improve WiFi Security, Encryption
Is Florida Really Such a Cybersecurity Risk?
Email-Based Attacks Still Wreaking Havoc on Enterprises, Study Finds
ISF: Balance Is Key to Mobile Security
— Scott Ferguson is the managing editor of Light Reading and the editor of
Security Now
. Follow him on Twitter
@sferguson_LR
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Iowa College Learns Education & Policies Are Keys to Endpoint Security