HACKED

A few facts and figures

  • 2016: 87% of UK universities had at least one incident
  • Virginia University: during 2014 and 2015 personal information in HR files was compromised following a malicious email. Staff were informed only in 2016
  • Harvard University: 8 schools and administrative organizations were asked to change their computer, user passwords and email passwords after an intrusion was spotted
  • Penn State: a breach compromised servers containing information on approx 18,000 people
  • Auburn University: social security numbers of over 360,000 applicants and people not affiliated with the university went online
  • Indian Institute of Management Ahmedabad (IIM-A) 2015: exam results of 2 million students were compromised

WHAT YOU NEED TO KNOW

THREATS
Unauthorized access to protected or unprotected data
Data leakage via endpoints
Innocent provision of information
Extortion, forced handover and trafficking
Viruses, Trojan horses or worms entering via endpoints
RISKS
Data about people, their families, finances, study program, exams, certification and assessments
Facility: internal and external information, nearly all digital data

This may happen

Stealing and misusing information, exam materials and results, certification, plagiarism
Financial loss
Failing to comply with regulations and standards like like like EU GDPR, or HIPAA
Wasted resources spent handling successful attacks
Irreparable damage to a facility’s integrity and image
Malicious control of a facility’s data networks and shutting down educational networks and web-portals
TO PROTECT YOUR DATA
CONTACT US

Data Protection Suite Modules

product
INSPECTOR
Inspector checks both file content and metadata without preventing the natural flow of business.
READ MORE
product
REPORTER
Reporter automatically pulls strategic and periodic information into reports and distributes them to defined recipients.
READ MORE
product
ENCRYPTOR
Encryptor, a smooth-running and transparent data encryption tool, fully protects your company’s private information.
READ MORE
product
DISCOVERER
Discoverer provides the knowledge and insight for security personnel to introduce current and strong data security policies to protect sensitive company information.
READ MORE
product
PROTECTOR
Protector has the flexibility and strength to control your port and device endpoints and to shield your company against external hazards.
READ MORE
product
AUDITOR
Auditor pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections in exportable reports.
READ MORE
Font Resize