Technology providers on protecting against unexpected vulnerabilities

Q: What can higher ed institutions do to best protect themselves from technical vulnerabilities that most people would not expect are vulnerabilities (for example, wireless printers)?

“The most important thing organizations can do is ensure they have visibility into every layer of their IT environment—from the network perimeter all the way down to the endpoints. The more an IT team knows about what is connected to the network, the more effectively they can secure it.”

—Joe Aronow, product architect, Cisco Meraki


Link to main story: Why colleges should start expecting the unexpected


“In response to security technical vulnerabilities, schools must establish relationships with NSA or DARPA to boost cyber education, host bug bounty competitions, hold cyber focused Lunch-and-Learns, expand security awareness program to include physical and digital presence, conduct phishing exercises, institute routine patch and update cycles, generate dedicated network for non-university devices, and incorporate industry standards (NIST, ISO, etc.).”

—Sarah Spagnola, Director of Marketing Communications, ACI Worldwide

“Sixty percent of breaches are a result of stolen credentials, most often as a result phishing attacks. Many of these attacks are launched through social media. Not knowing who you are connecting with, or whether someone you know has unwittingly accepted a malicious link they are sharing with you is dangerous.”

—Stephen P. Nardone, Director of the Security Solutions Practice, Connection

Categories:

Most Popular