{"id":24486,"date":"2017-02-22T05:00:28","date_gmt":"2017-02-22T13:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=24486"},"modified":"2017-02-17T11:14:33","modified_gmt":"2017-02-17T19:14:33","slug":"higher-education-balancing-openness-threat-cyberattacks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/02\/higher-education-balancing-openness-threat-cyberattacks\/","title":{"rendered":"Higher Education: Balancing Openness With the Threat of Cyberattacks"},"content":{"rendered":"<p>Higher education is a security dichotomy too tempting for cyberattackers to resist. On one hand, there are reams of valuable information: cutting-edge research, valuable intellectual property obtained with industry collaboration, confidential student and faculty records, and healthcare information. On the other, there is a culture of openness and partnership at colleges and universities critical to academic success, which is risky when it strays into IT and network security territory.<\/p>\n<p>Take campus Wi-Fi as an example. It\u2019s the heart of a college or university network. Most students, guests, visiting faculty and third-party workers access campus services through this network. Many administrative staff and faculty also use campus Wi-Fi to connect to services when they\u2019re on the move. For management simplicity and cost purposes, most universities want as few of these access networks as possible \u2013 ideally one. But with this approach, every user is only a username and password away from access to sensitive information.<\/p>\n<p>What are the alternatives? Some institutions run parallel guest, staff, student and research networks \u2013 a costly solution.\u00a0Yet access becomes difficult to manage when a student becomes a researcher, or visiting faculty or other valid third parties, such as vendors and contractors, require access. There is another way. Using Palo Alto Networks Next-Generation Security Platform, higher education institutions can differentiate users with different profiles on the same network.\u00a0For example, a university can grant students access to learning resources, graduate students access to research resources, guests access to internet and public-facing resources, and faculty access to their applications.\u00a0The only way this works is if your security platform can identify users (not just devices), applications and potential security threats in real time.<\/p>\n<p>Speaking of devices, college and university campuses were at the forefront of the BYOD revolution, but having no control over thousands of devices that use your network every day brings additional challenges. How do you keep college or university resources free from malware? How much responsibility do higher education institutions have to protect BYOD devices themselves?<\/p>\n<p>For insight and suggestions on how to tackle these and other issues, take a look at our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/security-reference-blueprint-higher-education\">Security Reference Blueprint for Higher Education Institutions<\/a>, a recent white paper that examines how institutions can protect data, improve uptime and availability, and prepare to meet new and emerging technological challenges while reducing security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Higher education must balance openness while remaining conscious of cyberthreats. <\/p>\n","protected":false},"author":47,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3013],"tags":[3282,3279],"coauthors":[717],"class_list":["post-24486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","tag-higher-education","tag-university"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=24486"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24486\/revisions"}],"predecessor-version":[{"id":24489,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24486\/revisions\/24489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=24486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=24486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=24486"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=24486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}