For these reasons, universities have generally remained ahead of the curve in monitoring their networks for indications of trouble and establishing levels of protection. At the same time, they have maintained the traditional openness of large segments of these networks, which are designed to support research agendas and the educational needs of professors and students alike. In the context of this delicate balance, there are still important and effective steps that colleges and universities can take. Expert recommendations diverge, but a few items consistently appear on multiple lists:
1. Minimize the damage ahead of time
2. Educate your users
Because university network users share the risk of infiltration — the staff and student sections of a university network are generally the most vulnerable — it is highly advisable that all professors, employees, students and others associated with a college campus take pre-emptive measures to protect their own networks. The responsibility for the security and safety of a network should be considered the collective responsibility of all its users. Several publications and organizations rate and rank the best packages for antivirus protection and spyware, malware and adware defense. For a nominal investment, devices can be equipped with the most up-to-date protection possible.
3. Consider the cloud
Backing up critical data daily to the cloud ensures that this information will be available later, should disaster strike. A hybrid cloud can allow an institution to mirror both onsite and offsite services and easily move them back and forth through a private network. To ensure that cloud services are secure, it becomes critical to develop a trusted relationship with the service providers assigned to protecting the institution’s data. To achieve the best results, encrypt all information exchanged between the institution and the service provider, know where the data is stored and establish an understanding that the stored data will remain private and not be mined.
At the same time, the university networks that carry the burden of these inherent vulnerabilities must also house critically sensitive information that demands the tightest security. It’s an almost schizophrenic balance that is demanded of them, to be obligingly open, yet rigidly secure, but the oxymoron is achievable, with the proper attention paid to key details.