search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Education


Going back to school on security


Matt Middleton-Leal, managing director for EMEA North at Qualys looks at the cyber security opportunities in the education sector.


T


he education sector is a common target for bad actors – according to the Department of Science, Innovation and Technology


Cybersecurity breaches survey 2024: education institutions annex report, more than half of primary schools (52%) identified a breach or attack in the previous twelve months. For secondary schools, the figure is even higher at 71%in the past year. Te worst off are further education and higher education institutions, where 85% and 97% saw attacks respectively. As pupils get older – and as universities and colleges hold more


sensitive information and financial data - the number of attacks goes up. Tese organisations are more engaged in security than the average business, due in part to their duty of care regarding student and pupil data and partly to the emphasis placed on security by their leadership teams. According to the research, security is a high priority for governors and / or senior management across the board - 98% of primary schools, 96% of secondary schools, and 100% of further education colleges and higher education institutions rated their leaders as highly engaged around security.


30 | May/June 2024 However, across the education sector, budgets


for spending around security are restricted. While economic conditions have affected the funding levels for schools, colleges and universities leading to flat or reduced budgets, the number of attacks has not decreased. In fact, it has grown - there are more opportunistic attacks taking place using automated ransomware as a service tool, while threat actor groups are using more soſtware vulnerabilities for attacks. Te Qualys Treat Research Unit found that 125 soſtware vulnerabilities were weaponised - turned from potential


risks into automated attacks that can be implemented at scale – in 2023, compared to 120 in the previous three years combined. So, for channel companies that want to engage with customers in


this sector, how can you plan ahead and be successful? Where can you make the most difference to education providers and deliver effective, profitable services?


Understanding IT in schools and colleges Te simple answer to this is that there is no one size fits all strategy to apply here. Tere are huge differences in how schools and colleges


www.pcr-online.biz


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52