Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Securing the New Hybrid Education Network
    Technology

    Securing the New Hybrid Education Network

    Securing the New Hybrid Education Network

    Published by Jessica Weisman-Pitts

    Posted on September 19, 2022

    Featured image for article about Technology

    By Anthony Webb, VP International at A10 Networks

    Even before 2020, connectivity played an important role in university life. In recent years, however, connectivity shifted from a mere convenience to a lifeline for students and universities. As these institutions built and expanded online remote access for their students, many from scratch, their IT departments were forced to shift their focus from on-campus networking to supporting a distributed global network to meet the new normal of education.

    Although in-person teaching has now seen a welcome return, the wealth of online learning resources available, both on internal and external networks, are an invaluable asset to both teachers and students. Meanwhile, online retail, banking, health services, gaming, media, and more are mainstays of student life.

    Now, the global networks established to support day-to-day teaching have encountered another obstacle, as the expanded attack surface attracts growing cybercrime. Over the last two years, the NCSC has released multiple warnings about the rise of ransomware attacks on higher education, with experts calculating that the average cost of a cyber attack on the UK educational sector is £620,000. Not only do these institutions hold large amounts of PII, but they are frequently home to sensitive research and development data, making them highly valuable targets.

    The Continued Needs of the New University

    The pandemic was a wakeup call for IT departments in universities: improvisation and a patchwork of legacy infrastructure and security could no longer suffice. Higher education institutions needed a considered plan for moving to a more resilient, on-demand model.

    Higher education faces one of the most challenging environments in IT. From proliferating unmanaged devices to spiky traffic patterns driven by class schedules, to highly latency-sensitive applications such as online classes, research, video, music, and gaming, the demands on university IT echo those of a commercial service provider, rather than an enterprise. In meeting these requirements, IT must have a fully developed strategy to ensure high availability, disaster recovery, multi-cloud security, and load balancing.

    While the sector reacted as quickly and securely as possible and the shift to online education was a great success in mitigating the disruption caused by the pandemic, the rapidly evolving world of cybercrime means that these same institutions must now reassess their network security.

    Securing on-demand education

    As the university environment benefits from its recent expansion beyond the campus, these institutions need a cyber security model that recognises that a threat can come from anywhere. The Zero Trust model responds to these challenges by adopting the approach of “trust nobody”—inside or outside the network. Under Zero Trust, cybersecurity strategies are redesigned to follow a set of key principles:

    • Creating network micro-segments and micro-perimeters to restrict traffic flow within the network and limit excessive user privileges and access as much as possible.
    • Strengthening incident detection and response using comprehensive analytics and automation.
    • Providing comprehensive and centralised visibility into users, devices, data, the network, and workflows.

    To preserve the growing number of learning platforms and resources accessible online, it is essential to secure them against HTTP and web application-based security flaws. Web application firewall systems use specific knowledge of HTTP and web-application vulnerabilities to filter or block these attacks without ever exposing the web servers or applications. This helps protect the environment against a host of attacks and is a must-have for modern educational institutions.

    Automated DDoS protection is another critical step in protecting against widespread and easily launched DDoS attacks. Universities should leverage DDoS threat intelligence, combined with real-time threat detection, to defend against DDoS attacks no matter where they originate. Methods such as automated signature extraction and black-listing botnets’ IP addresses and available vulnerable servers create effective, proactive defences.

    Integrated Security Approach

    Over the years, most organisations have amassed a number of legacy-based security point solutions, which address specific threats. These systems – added incrementally as new threats emerge and new approaches are provided – create an increasingly complex system, adding latency into applications and reducing the overall effectiveness of the business’ cyber security strategy.

    Universities should look towards an integrated approach that consolidates cyber security functions as much as possible, in turn allowing these functions to work together seamlessly for unified security and enabling compliance.

    In conclusion, while the shift to remote and on-demand learning accelerated by the COVID-19 pandemic, the transformation of higher education had already been well underway. Finance and enrolment operations were already driving universities away from on-premises systems, offering more dynamic options for students to interact with the establishment, regardless of whether they were on-site or not.

    But with the exponential growth of online resources in the last two years, the evolution in business models is now clear. What remains is to ensure that universities’ technology stack can support the new direction, maintain availability wherever and however students connect, and ensure the security of its students and employees alike.

    Related Posts
    Redefining Cloud Reliability at Scale: Advancing Secure and High-Performance Multi-Cloud Systems
    Redefining Cloud Reliability at Scale: Advancing Secure and High-Performance Multi-Cloud Systems
    Apuroop Reddy Bannur: How Intelligent Technology and AI-Driven Trade Innovation is Transforming Global Supply Chains
    Apuroop Reddy Bannur: How Intelligent Technology and AI-Driven Trade Innovation is Transforming Global Supply Chains
    Vector Algorithmics highlights risk control through October’s record crypto liquidation event
    Vector Algorithmics highlights risk control through October’s record crypto liquidation event
    The Quiet Revolution in Cloud Security and AI-Driven Reliability
    The Quiet Revolution in Cloud Security and AI-Driven Reliability
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostThe impact of AI on the disputes and investigations landscape
    Next Technology Post7 cost benefits of cloud accounting software

    More from Technology

    Explore more articles in the Technology category

    Trust Embedding: Integrating Governance into Next-Generation Data Platforms

    Trust Embedding: Integrating Governance into Next-Generation Data Platforms

    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks

    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks

    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet

    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet

    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.

    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    View All Technology Posts