Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Securing the New Hybrid Education Network
    Technology

    Securing the New Hybrid Education Network

    Published by Jessica Weisman-Pitts

    Posted on September 19, 2022

    5 min read

    Last updated: February 4, 2026

    A middle-aged teacher engaged in delivering an online lesson from home, representing the transition to hybrid education networks in universities. This image underscores the importance of secure and reliable connectivity in today's educational landscape.
    Teacher conducting an online class, highlighting the shift to hybrid education networks - Global Banking & Finance Review
    Tags:cybersecuritytechnologyEducationDigital transformationrisk management

    By Anthony Webb, VP International at A10 Networks

    Even before 2020, connectivity played an important role in university life. In recent years, however, connectivity shifted from a mere convenience to a lifeline for students and universities. As these institutions built and expanded online remote access for their students, many from scratch, their IT departments were forced to shift their focus from on-campus networking to supporting a distributed global network to meet the new normal of education.

    Although in-person teaching has now seen a welcome return, the wealth of online learning resources available, both on internal and external networks, are an invaluable asset to both teachers and students. Meanwhile, online retail, banking, health services, gaming, media, and more are mainstays of student life.

    Now, the global networks established to support day-to-day teaching have encountered another obstacle, as the expanded attack surface attracts growing cybercrime. Over the last two years, the NCSC has released multiple warnings about the rise of ransomware attacks on higher education, with experts calculating that the average cost of a cyber attack on the UK educational sector is £620,000. Not only do these institutions hold large amounts of PII, but they are frequently home to sensitive research and development data, making them highly valuable targets.

    The Continued Needs of the New University

    The pandemic was a wakeup call for IT departments in universities: improvisation and a patchwork of legacy infrastructure and security could no longer suffice. Higher education institutions needed a considered plan for moving to a more resilient, on-demand model.

    Higher education faces one of the most challenging environments in IT. From proliferating unmanaged devices to spiky traffic patterns driven by class schedules, to highly latency-sensitive applications such as online classes, research, video, music, and gaming, the demands on university IT echo those of a commercial service provider, rather than an enterprise. In meeting these requirements, IT must have a fully developed strategy to ensure high availability, disaster recovery, multi-cloud security, and load balancing.

    While the sector reacted as quickly and securely as possible and the shift to online education was a great success in mitigating the disruption caused by the pandemic, the rapidly evolving world of cybercrime means that these same institutions must now reassess their network security.

    Securing on-demand education

    As the university environment benefits from its recent expansion beyond the campus, these institutions need a cyber security model that recognises that a threat can come from anywhere. The Zero Trust model responds to these challenges by adopting the approach of “trust nobody”—inside or outside the network. Under Zero Trust, cybersecurity strategies are redesigned to follow a set of key principles:

    • Creating network micro-segments and micro-perimeters to restrict traffic flow within the network and limit excessive user privileges and access as much as possible.
    • Strengthening incident detection and response using comprehensive analytics and automation.
    • Providing comprehensive and centralised visibility into users, devices, data, the network, and workflows.

    To preserve the growing number of learning platforms and resources accessible online, it is essential to secure them against HTTP and web application-based security flaws. Web application firewall systems use specific knowledge of HTTP and web-application vulnerabilities to filter or block these attacks without ever exposing the web servers or applications. This helps protect the environment against a host of attacks and is a must-have for modern educational institutions.

    Automated DDoS protection is another critical step in protecting against widespread and easily launched DDoS attacks. Universities should leverage DDoS threat intelligence, combined with real-time threat detection, to defend against DDoS attacks no matter where they originate. Methods such as automated signature extraction and black-listing botnets’ IP addresses and available vulnerable servers create effective, proactive defences.

    Integrated Security Approach

    Over the years, most organisations have amassed a number of legacy-based security point solutions, which address specific threats. These systems – added incrementally as new threats emerge and new approaches are provided – create an increasingly complex system, adding latency into applications and reducing the overall effectiveness of the business’ cyber security strategy.

    Universities should look towards an integrated approach that consolidates cyber security functions as much as possible, in turn allowing these functions to work together seamlessly for unified security and enabling compliance.

    In conclusion, while the shift to remote and on-demand learning accelerated by the COVID-19 pandemic, the transformation of higher education had already been well underway. Finance and enrolment operations were already driving universities away from on-premises systems, offering more dynamic options for students to interact with the establishment, regardless of whether they were on-site or not.

    But with the exponential growth of online resources in the last two years, the evolution in business models is now clear. What remains is to ensure that universities’ technology stack can support the new direction, maintain availability wherever and however students connect, and ensure the security of its students and employees alike.

    Frequently Asked Questions about Securing the New Hybrid Education Network

    1What is cybersecurity?

    Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. It aims to safeguard sensitive data from unauthorized access and damage.

    2What is a Zero Trust model?

    The Zero Trust model is a cybersecurity approach that operates under the principle of 'trust nobody.' It requires strict identity verification for every person and device trying to access resources.

    3What is a web application firewall?

    A web application firewall (WAF) is a security system that monitors and filters HTTP traffic to and from a web application. It protects against various attacks such as SQL injection and cross-site scripting.

    4What is DDoS protection?

    DDoS protection refers to measures taken to defend against Distributed Denial of Service (DDoS) attacks, which overwhelm a network or service with traffic to disrupt its availability.

    5What is incident detection and response?

    Incident detection and response involves identifying and responding to security breaches or attacks in real-time to minimize damage and recover quickly.

    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Technology

    Explore more articles in the Technology category

    Image for Debtist: Digital Debt Collection for Modern Businesses
    Debtist: Digital Debt Collection for Modern Businesses
    Image for Infosecurity Europe launches new Cyber Startup Programme to champion the next generation of cybersecurity innovators
    Infosecurity Europe launches new Cyber Startup Programme to champion the next generation of cybersecurity innovators
    Image for BLOXX Launches ĀRIKI BLOXX at Web Summit Qatar
    BLOXX Launches ĀRIKI BLOXX at Web Summit Qatar
    Image for Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Image for Over half of organisations predict their OT environments will be targeted by cyber attacks
    Over half of organisations predict their OT environments will be targeted by cyber attacks
    Image for Engineering Financial Innovation in Renewable Energy and Climate Technology
    Engineering Financial Innovation in Renewable Energy and Climate Technology
    Image for Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Image for Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Image for In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    Image for Ballerine Launches Trusted Agentic Commerce Governance Platform
    Ballerine Launches Trusted Agentic Commerce Governance Platform
    Image for Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Image for The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    View All Technology Posts
    Previous Technology PostThe impact of AI on the disputes and investigations landscape
    Next Technology Post7 cost benefits of cloud accounting software