Security Hits the Books

Barton County Community College enforces good cyber defense on Kansas campus

MAJOR cyber security breaches at higher education institutions have garnered headlines over the last couple years. Obviously, IT security continues to be a major challenge for colleges and universities. A recent survey from technology provider CDW Government found that 69 percent of higher education IT directors/managers polled said that IT security is a top priority for their institutions' administrations. Yet, 66 percent of respondents note they are able to dedicate less than one quarter of their time to security, citing lack of funding (50 percent) and lack of resources (12 percent) as the top two barriers to improving IT security on campus.

As higher education institutions face increasingly sophisticated security threats with sometimes limited resources, they must continue to foster education and self-discovery in safe environments to shape tomorrow's leaders. These principles must extend from the traditional classroom environment to the growing frontier of technology-powered education to protect students from outside cyber security threats and to ensure they follow proper cyber citizenry guidelines.

Barton County Community College in central Kansas is strengthening its cyber security posture to protect its 1,200 PC networks from increasingly sophisticated online threats without limiting the impact of IT-driven learning.

To manage a higher volume of increasingly complex cyber threats, Barton has segmented its IT campus in order to efficiently quarantine the student dormitories or other areas should they become infected by viruses or malicious code -- effectively keeping the rest of the campus safe from cyber attack. While this complex security segmentation reduces the risk of widespread infection, it also creates an exponential increase in management requirements. To purchase and implement a project of such complexity, Barton needed a trusted advisor to provide its new cyber security solution.

Working with CDW-G, Barton implemented a new firewall and virtual private network (VPN) solution to enhance cyber defenses while also providing a dashboard view of all subnets to simplify security management.

Balacing IT Management and Security
For more than 35 years, Barton has been preparing students for success through a blend of classroom and practical hands-on education. A majority of Barton's more than 50 degree programs incorporate the use of technology to prepare students to take their place in today's workforce. Barton also offers technology-focused degrees, including computer information systems and computer science. The college's wired buildings and computer labs ensure that technology access is at the fingertips of its more than 5,000 students. Although the Internet fosters increased communication and research capabilities, Barton's seven-member IT staff also must maintain vigilance against online threats.

Keeping Up with IT Gatekeeper Demands
"The increasing severity of computer viruses and malicious code has transformed information security from a low IT priority to an operational necessity," said Amy Oelke, co-team leader, information services at BCCC. "The evolving cyber threats were outpacing our existing firewall technology and making it increasingly challenging to monitor and manage our IT environment efficiently."

College administrators believe they have an obligation to prevent cyber mischief by their students. As a member of KanREN, a statewide research and education network that connects leading academic institutions and other organizations, Barton must ensure that student actions do not impact other KanREN members or other businesses.

"As Barton's IT gatekeepers, we have the dual responsibility of preventing outside cyber threats from affecting our infrastructure while also ensuring that curious students don't mistakenly unleash viruses within our network or tap outside systems that are private," Oelke said. "We also need to identify and repel malicious code at the edge of our network to prevent any IT problems."

Barton's IT staff monitors information security logs for suspicious activities of all types. Additionally, Barton's 14 physical and 31 logical network segments -- called subnets -- enable the college IT staff to isolate network areas infected by malicious code. This strategy prevents viruses detected in the student dormitory subnet, for example, from spreading across the entire network. Barton's network subnet capabilities, however, require the IT team to dedicate a considerable amount of time to managing the school's security infrastructure. The IT team used Sun Microsystems' SunScreen technology, which required Barton to use vendor-specific software/hardware and did not provide the VPN flexibility required for easy remote access. Importantly, today's cyber security realities also allow the IT team to view firewall logs in real time with sophisticated querying to gain immediate insight into potential security breaches.

Mapping Security to College Requirements
Barton's IT team faced numerous options when researching new security technologies.

"We required insight from a partner that understands the unique security requirements of an academic network and would help finalize product specifications within our budget," Oelke said. "We could not afford to make the wrong investment."

Barton selected CDW-G and its engineering team as a sounding board for product selection and to recommend software licensing and technical agreements that address the college's requirements. CDW-G combined its knowledge of the needs of higher education customers and of comprehensive product line from proven vendors to support Barton's security requirements. CDW-G helped the Barton team prepare for its presentation to the college board of trustees, during which it secured approval for funding for the new security solution.

"Barton is a leader in IT security," said Julie Smith, director of higher education, CDW-G. "They understand what is required to deal with today's ever-evolving security threats in order to manage their networks and protect student and administrative data effectively."

Deploying a Powerful, Flexible Security Infrastructure
Upon receiving IT funding approval, the Barton IT team deployed an initial pilot phase of its new solutions from CheckPoint Software Technologies in the late summer of 2004.

"Deploying a security solution effectively requires a strong understanding of your network, routing and how security product settings may impact other systems or users' access to important information," Perkins said.

The new and existing security solutions ran in tandem to ensure a high level of security while the pilot program was expanded. The new CheckPoint solution went live in November 2004.

"Our experience with our new security solution has been extremely positive and CDW-G has been very responsive during the entire process," Perkins said.

The new security solution enables Barton to manage its physical and logical subnets from a single dashboard that simplifies and accelerates network traffic monitoring and management. Additionally, the new security solution is intuitive, enabling multiple Barton IT staff members to manage the college's security infrastructure concurrently. The college's previous security solution was specialized -- only one staff member was trained to manage the technology.

The new solution's enhanced VPN and log-in capabilities simplify remote network access. The new security solution also consumes less processing power than its predecessor and operates on multiple vendor operating systems and hardware platforms.

Increasing Security Vigilance
Barton has planned a phased approach to broaden its cyber security capabilities. The college is expanding its cyber security management to the application level by increasing its monitoring of security and network infrastructure logs to identify additional malicious activities such as port scans that hackers use to locate network security vulnerabilities. By monitoring malicious activity on the network, IT staff can determine the techniques used to compromise network resources. Using the built-in application intelligence in the CheckPoint software, Barton can identify and block activity at the firewall in real time. The ability to look into each data packet to determine its validity provides another layer of protection and gives BCCC's IT team fine-grained control over all server requests.

BCCC also plans to systematically expand its multilayered hardware/software firewall strategy by further segmenting IT resources based on institutional goals to protect student data.

"Cyber security is a dynamic process that requires us to protect the college continually against ever-evolving threats," Oelke said. "We are confident that our new security technologies will provide the flexibility to expand our information defenses and address tomorrow's requirements. Our strategy to combine security products, policies and vigilance is integral to maintaining a safe and engaging online environment for the Barton community."

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.