Do You Know Where Your Data Is?

Do You Know Where Your Data Is?

Educational institutions are a data treasure trove.

Data breaches occur on a weekly basis. Educational institutions are not immune to a data breach. Rather, they’re instead a data treasure trove, full of student email addresses, physical addresses and financial information. The reality, educational institutions are not safe guarding their student’s data and that data is being easily exploited by malicious criminals.

These institutions are being targeted and the frequencies of attacks are picking up in volume. According to a 2016 Campus Technology Report, the number of lost, stolen or compromised data records increased to 164 percent in the first 6 months of 2017.

Further, a recent IBM report showed just how costly a data breach is for higher institutions and the true worth of their data. The cost of a data breach for a U.S. educational institution is higher than any other sector. The average cost per compromised data record is $245 in comparison to $225 of all U.S. organizations and $200 of education institutions worldwide. U.S. education data is leading the way.

Educational institutions are being targeted my malicious criminals daily, but when it comes to the news, their data breach exposure becomes buried by more high profile companies like Facebook and Equifax. These educational organizations are being targeted in all facets of their identity from student service accounts to alumni associations. Recent data breaches include the Clemson Alumni Association with data exposure due to a third-party security lapse. And a Fresno State University data breach that lead to more than 15,000 victims affected when a flash drive with information was stolen - insider threat?

The point remains, data breaches need to be on the security priority list for higher institutions and administration needs to look closely into best security practices.

The first step in securing data is to understand where your most precious data is located. It’s very hard to protect everything and keep a watchful eye on all your data. Knowing where your most sensitive data is, is a fundamental first step in data security. To successfully start this process, appoint a data steward to inventory critical data and ensure a robust plan exists for data protection.

Designating a position to lead this movement is important, because often these duties are filtered onto IT employees. IT employees are generally overworked and overwhelmed. By designating a team and leader to head data security, you’re ensuring success. Lastly, data security isn’t an IT problem, or an administration problem. It’s everyone’s problem, and it’s everyone’s responsibility. Once critical data is classified and an employee is assigned to it, upper management needs to be invested in the protection of that data, and the importance of keeping the data safe needs to be talked regularly at board meetings.

Once you have classified sensitive data, you can move on to four important steps to further protect your data.

Create an Incident Response Plan

The longer an organization takes to respond to a data breach, the higher financial consequences. Malicious criminals wish to go unnoticed. The longer they can sit in the system and exploit data, the longer they can collect data and sell it for profit. Creating a robust incident response plan is a proactive approach to eliminating data breach lag time and responding to an incident correctly.

Educational institutions take longer to respond to data breaches than other organizations. But having a response team in place leads to lower data breach costs. Organizations with a incident response team saw a lower average cost by $19 per record. In order for a incident response plan to be successful, the program needs to meet multi-level training and awareness needs for employees.

Encryption, Encryption

Securing sensitive data through encryption is one of the most basic approaches to data security. Encryption works simply by adding another layer of protection through ‘scrambling’ your data that can only be put back in the right order through an encryption key. In order to ensure your encryption strategy is just, you need to encrypt all forms of data - data at rest, data in transit, or data in use - and not to forget the encryption of sensitive backups. Organization with encryption, according to a recent study, saw breach costs on average $16 less per record.

Be Prepared: Employee Training

If a data breach occurs, can you employees react accordingly? Just like a fire drill or medical accident, employees need to be prepared and know how to respond. A data breach is not a separate story, and it should be treated in much the same way as these others. Training employees on how to spot phishing emails, or educating them on reasons why to protect company data is important. An organization is a team and all team members must be dedicated to the protection of its company data. According to the same study, companies with robust training programs saw costs that averaged $12.50 less per record. Training is only the beginning, and the IT team should implement creative and informative ways to keep engaging staff about data security.

Monitoring

In a perfect world, we should be able to stop sensitive data from leaving an organization and know when it’s happening in real-time. This reality is not too far off with recent developments in technology like user analytics and monitoring. Employee monitoring software tracks and records all of an employee’s computer activity, including web searches, emails sent and received, and the time spent using various applications. The software creates a ‘standard’ profile of normal behavior of both the employees and the computer system. When this normal behavior deviates, an administrator can be alerted quickly and directly stating what sensitive information was accessed.

Data security is a problem, but by combining these four additional layers of protection, these organizations will be on their way to data safety success.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities