Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies


These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Securing student and employee digital access secures your university’s brand


Ironically, as the digital era removes limits on access to information, it is universities, themselves symbols of free and unlimited access to information, that may be most threatened.

Precisely because universities don’t wish to impede student access to information, they have concentrated less on securing their networks and technology platforms than on other areas of IT. Also, internal competition for tightly constrained IT spend tends to be focused on increasing control of information rather than improving access to it.

Unintentionally, therefore, universities make themselves susceptible to cyberattacks. Many have become part of global botnets. Mostly, this happens because students tend to visit unsecured networks and fall prey to malware. There may also be vulnerabilities in a university’s internal systems that can be compromised. Regardless of the cause, a university that contaminates its own and other research and education communities while overlooking the weaknesses in its defences is highly likely to suffer damage to its reputation and brand.

In addition, the risk of losing its own data because it just doesn’t have appropriate cybersecurity defences in place should make every university reprioritise its IT spend.

The good news is that security isn’t that difficult or expensive to implement.

Step 1: Use the cloud for common security functions

Some of the burden can be eased by moving administrative and other common security functions into the cloud. This gives universities the benefits of world class, best practice security at less cost than an in-house implementation. And, it ensures that employees can get on with their jobs without compromising the brand.

Step 2: Know your students

Securing the university’s own network takes a little more thought and planning. It’s partly a technology challenge that initially boils down to knowing your students and users. Highly effective security can be achieved if you know which students need particular levels of access to which data. This enables you to authorise them accordingly.

Then you need automated monitoring of the network, again with student context in mind. If your student base is primarily Chinese, why is someone from Russia on the network?

Step 3: Educate and encourage them

Beyond the technology considerations, it’s essential also to pro-actively teach and encourage students to embrace authentication and network security in general as a way of ensuring that the resources they get from your institution are clean and valid. Their future depends on it.

This may be your toughest security challenge, simply because students expect ubiquitous, easy access. Stodgy authentication processes that kick in slowly or official networks that plod along will only drive students to risk seemingly easier but less secure options.

So, your cybersecurity has to be slick and seamless and, therefore, dare one say it, cool.

That’s not something universities inherently focus on. It’s not part of their general mandate. But it is the mandate of specialist cybersecurity providers. It’s their entire focus and reason for existence. Best, therefore, to tap in, through a close partnership, to the expertise and capabilities of a provider that not only has global cybersecurity credentials and a proven appetite for continuously staying ahead of the threat landscape but also understands and can enable the specific requirement of universities to be open and free. Your brand depends on it.

Join the conversation on the Accelerate into Digital LinkedIn Group.

Previous Article: Walking the path to optimised hybrid IT what can you learn from others on the journey Next Article: Security and performance are key to exploiting Blockchain

You may be interested in

Man working on computers

Protect your data from the inevitable ransomware attack

To cope with this new kind of threat, your backup and recovery strategy needs to adapt.

Read blog
Rocky ocean

What I learned from hacking the Winter Olympics

I used to think that technology was the answer to all security questions, but my experience post 9/11 taught me that governance should always be the starting point for security discussions.

Read blog

The two-way conversation you need to have with your CEO on cybersecurity

With cyberattacks featuring regularly in mainstream news, it’s good to see that Boards and CEOs are becoming more cybersecurity conscious.

Read blog

Balancing risk and innovation

There’s no question that digital is the way forward. It offers tremendous benefits to your business: faster speed to market, more business intelligence and improved customer relationships.

Read blog