by Jonathan Wharton-Street
The UK’s schools, colleges and universities are currently experiencing a surge in ransomware attacks, according to the National Cyber Security Centre (NCSC). While organisations in many verticals are being targeted by the same financially motivated threat actors, the education sector has arguably more to lose than most. With schools and unis playing catch-up after a year of lockdown disruption, they can ill-afford more set-backs due to digital extortion.
Fortunately, best practice security to help mitigate risk in this area needn’t be onerous. The NCSC and Trend Micro have a wealth of resources and capabilities to help protect your organisation.
by Jonathan Wharton-Street
Ransomware threats have been building for several years. With the barrier to entry lowered considerably thanks to “as-a-service” affiliate programmes, threat groups have thrived. Along with healthcare, the education sector was hard hit during the height of the pandemic, particularly in the UK. Unfortunately, the risks are no less acute in 2021: the National Cyber Security Centre (NCSC) has recently issued a new alert warning of a surge in attacks on schools, colleges and universities.
From speaking with customers in the education sector, we understand that the lack of centralised visibility and management across hybrid environments and systems has put a strain on resource to manage the disparate systems / consoles by multiple vendors, but more importantly that this has created a risk of threats been missed or a delay in seeing them until too late. We also understand that 3rd party Research which brings in much needed revenue to Higher education customers, is an areas that most concerns them from the threat of ransomware.
In this first of a mini blog series on ransomware in the education sector, we take a look at the scale of the threat, and where resources should be best directed to mitigate it.
by Simon Walsh
IT security teams have always been on the back foot against agile and determined adversaries. But the concern among CISOs is that the pendulum has swung even further away from them over the past couple of years. Trend Micro alone blocked nearly 63 billion threats last year. This puts tremendous pressure on the security operations (SecOps) analysts tasked with detection and response. And as a new study from Trend Micro reveals, they’re reaching breaking point.
A major part of the problem appears to be a historic over-investment in monitoring tools. If you can’t work from a single version of the truth, prioritising threat alerts effectively is going to be near-impossible.
by Bharat Mistry
It’s easy to forget that cybersecurity is fundamentally about people. Attacks are launched by threat actors, phishing emails are opened by employees, and it is your SecOps team that has to try and detect and respond to increasing volumes of these threats. As good as technology systems are, we haven’t got to the point where all of this defensive work can be automated. So what happens when your most precious resource, your security team, feels overwhelmed by their workload?
According to new research from Trend Micro, it’s a question an increasing number of organisations are facing—but few have a satisfactory answer to. The reality is that under pressure SecOps teams need better tools to correlate and prioritise alerts, so they can work more efficiently.