Data Security Challenges For Higher Educational Institutions

In a world with an increasing dependence on technology, the rapid user adoption of multiple devices as a way to conduct business productively has quickly become a reality for organizations.

For Educators, this reality is even more evident with faculty and students using a variety of platforms to research, learn, access and store information. Given a school’s diverse and ever-changing population, regulatory compliance issues around privacy of student records, along with providing secure access into course material and other data by remote and transitional users, protecting this critical data presents a unique challenge.

The protection  of sensitive information such as student and parent information, financial records, loans, employment records, intellectual property, and other important documents is paramount for educational institutions.

It’s only natural that students come and go from term to term and that faculty members and administration move from school to school. When that happens, it’s important to understand how this impacts data security.

Without a system to manage all accounts and devices from a centralized location, it’s virtually impossible to ensure the security of data on every device.

With students and staff using an average of two to three devices simultaneously, the need for an operating system agnostic solution from a central location is even more imperative.

Today, laptops, tablets, shared workstations in classrooms and labs, USB keys, EFSS platforms, and personal mobile devices all provide ways for students and staff to access and share learning materials and in many cases, sensitive information. Just like corporate organizations, many schools are embracing the Bring Your Own Device trend and implementing policies that encourage their use.

The use of personal mobile devices can:

  • Increase productivity in staff, faculty and students
  • Provide flexible access to learning materials, like e-textbooks and apps, resulting in a more favorable learning environment
  • Reduce IT costs as devices are not purchased through the school

But – 50% of breaches are from laptops or other compromised locations, such as mobile devices.

With the increasing use of devices on campus, IT departments need to evolve to handle the growth. The challenge facing educators is how to develop a cost effective flexible strategy so that “Bring your own Device”, doesn’t turn into “Bring your own Disaster.”

Previous Post
Best Practices for Securing Internal Data Breaches
Next Post
6 Best Practices for Data Security in the Cloud

Related Posts

Enterprise Encryption for Linux

Enterprise Encryption for Linux

Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops.  Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux: (more…)

Oh, so you stop hackers and stuff?

What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from…
Read more

Kill Switch the Game Changer

Have you heard of Apple’s “Kill Switch”? If not, then you might want to look into it. This feature is the new theft deterrent system that will allow the owner of the device to remotely lock it and wipe it…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 0 seconds