The top security challenges facing educational institutions running multiple clouds include:

  • Poor visibility: Each cloud vendor approaches security in a different way, making consistent policy and meaningful visibility very difficult.
  • No integration or coordination: Security measures are often piecemeal and isolated.
  • Reactive security: In this era of zero-day threats and shrinking intrusion-to-breach windows, schools can’t afford to be reactive in their security approach.

IT teams that lack integration of security products are going to have difficulty understanding whether they’re adequately protecting students and data. In addition, compiling information from different systems to create an overall compliance report is very time-consuming.

How to keep your college safe
With applications and data spread across multiple clouds, how can you keep your school safe? Here are five best practices.

1. Control network access. Due to the high volume of users entering and exiting a school’s network, it is crucial to identify who have access and to which resources. For effective cybersecurity, use solutions that can easily identify users and then dynamically assign access to network segments accordingly.

2. Centralize your control. You likely have many point solutions to address multiple attack vectors. However, because each of these point solutions provides different intelligence and varying degrees of data visibility, relying on information from each of these siloed tools can be burdensome on resources.

Your IT teams would benefit from a centralized single-pane-of-glass visibility into data movement across the network to effectively manage network security controls. This would also offer a simplified view of security alerts across disparate security devices. This is integral, as IT teams do not usually have the staff needed to cross-correlate this data and monitor each solution themselves.

How to overcome multi-cloud security challenges

3. Consolidate your endpoints. With more applications, technologies, and IoT devices being added to the network, each independent endpoint becomes a potential entryway into the network. When you consolidate these potential entryways by tying them together through a single, integrated network security framework, you drastically reduce your potential attack surface and simplify your cybersecurity efforts while more efficiently coordinating them across the network.

4. Get threat intelligence. Cyber attacks can be disseminated through a multitude of attack vectors such as emails, web applications, or malicious links and attachments. Ransomware is a big threat in the education space, but universities are also regularly targeted with phishing attacks and DDoS attacks using botnets to achieve their means. Schools are also targeted by zero-day vulnerabilities, or flaws in their hardware and software, that are difficult to detect until it is too late and a breach has occurred. To mitigate each of these types of attacks, deploy both global and local threat intelligence to update your security infrastructure.

5. Choose automation. The right technology is critical, but so are the people who oversee it. In addition to IT infrastructure and security solutions, hire IT teams that can deploy each piece of technology and ensure it runs effectively. Building out this infrastructure and team on a limited budget is a challenge, especially given the cybersecurity skills gap employers are facing. As a result, IT teams with limited resources often put an emphasis on functionality while neglecting security. In today’s threat landscape, security cannot be an afterthought.

Because IT resources are limited, deploy integrated and automated security infrastructure that allows rapid response to each incident, without having to wait for data to be collated and addressed by a busy team member. Additionally, these capabilities result in decreased cybersecurity costs, as integrated solutions are more cost-effective than disparate point solutions or employing a large enough IT team to manage the network manually.

When architected properly, network security enables digital transformation and e-learning, letting your institution reap the benefits of exciting new technologies.

About the Author:

Jonathan Nguyen-Duy leads strategic programs at Fortinet where he focuses on emerging technologies and key partnerships. He is a well-known cybersecurity leader who was most recently the security chief technology officer at Verizon Enterprise Solutions, where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Data Breach Investigations Report.


Add your opinion to the discussion.