<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/andrew-brickell/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/andrew-brickell</link><item><guid isPermaLink="false">9600383d-37de-40cf-8d8b-b502acbca797</guid><link>https://www.ivanti.com/en-gb/blog/exercise-right-solid-cybersecurity</link><atom:author><atom:name>Andrew Brickell</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/andrew-brickell</atom:uri></atom:author><category>Security</category><category>Universities</category><title>Exercise Your Right to Solid Cybersecurity</title><description>&lt;p&gt;Universities notoriously have a complex network to manage and secure. IT professionals have to deal with an intricate combination of staff and student users, who can access the network both on and off-campus, a multitude of devices that are university and student-owned – and which frequently connect to foreign networks – and a high turnover of users each year. This situation lends itself to a high-risk cyber-environment, so IT professionals must be extra-vigilant when working to secure a university network from malicious actors.&lt;/p&gt;

&lt;p&gt;It is for this reason exactly that &lt;a href="https://www.jisc.ac.uk/" target="_blank" rel="noopener"&gt;Jisc&lt;/a&gt;, a not-for-profit organisation dedicated to providing digital technologies for UK education and research institutions, created &lt;a href="https://www.jisc.ac.uk/" target="_blank" rel="noopener"&gt;Exercise Mercury&lt;/a&gt; – an activity that universities can participate in to expose weak spots and vulnerabilities in their network that could grant access to cybercriminals.&lt;/p&gt;

&lt;p&gt;During Exercise Mercury, two universities are paired off and spend a week attacking the other to discover vulnerabilities in their processes, policies, procedures, infrastructure and digital footprint. Each institution can use their full range of skills, resources and personnel – this isn’t an activity solely reserved for IT. After what is essentially a simulation of a cyberattack, the winner is the one who would have caused the most damage – after which, each university can go away and resolve the vulnerabilities discovered.&lt;/p&gt;

&lt;h2&gt;A Lesson from Exercise Mercury&lt;/h2&gt;

&lt;p&gt;Exercise Mercury is now in its third year, having been launched at the 2018 Jisc Security Conference. During this time, it has been noted that the main areas of vulnerability discovered are often the same.&lt;/p&gt;

&lt;p&gt;The biggest of these areas of vulnerability stem from IT teams not accurately knowing what assets they have, how many, and who owns them. This is a pain point that particularly affects higher-education organisations due to their large, distributed networks with staff and students often working in non-typical ways. Exercise Mercury found that the main cause of this vulnerability was legacy IT, which includes technology that was used for one project that is now long forgotten about, and technology that has been moved to the cloud but not yet upgraded.&lt;/p&gt;

&lt;p&gt;So, if IT professionals don’t have a hold on all of their assets, how can they hope to respond if they are compromised? This dilemma is magnified in a university setting where IT teams are having to deal with countless requests from students and staff with already limited resources. Add the monumental task of migrating to the cloud, or to a new OS (such as we saw recently with Windows 7 EOL), and it can seem impossible to keep on top of everything.&lt;/p&gt;

&lt;h2&gt;What’s the next step?&lt;/h2&gt;

&lt;p&gt;Whilst digital transformation is the buzzword of the moment, what this shows is that higher-education organisations may need to get their house in order before investing in the next big thing. According to a recent Ivanti survey, &lt;a href="https://www.ivanti.com/blog/how-it-professionals-are-managing-assets" target="_blank" rel="noopener"&gt;over 60% of IT professionals&lt;/a&gt; are currently missing key information in their ITAM programme. So, IT teams must start from the ground up and complete a proper audit and discovery of all the technology that is being used on the network, and from there they can work out how to keep it secure.&lt;/p&gt;

&lt;p&gt;This period of discovery will also enable security teams to make their policies and processes more cohesive with the technology at play. The findings from Exercise Mercury highlighted that the communication of these policies needs to be &lt;em&gt;“more push than pull”&lt;/em&gt; – they should be made as easy to find and digestible as possible.&lt;/p&gt;

&lt;p&gt;Currently, &lt;a href="https://www.ivanti.com/blog/how-it-professionals-are-managing-assets" target="_blank" rel="noopener"&gt;43% of IT professionals&lt;/a&gt; still track IT assets in spreadsheets – a shocking figure when we assess that discovery and data is at the heart of everything. Universities should look to invest in an &lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management" target="_blank"&gt;IT Asset Management tool&lt;/a&gt; to better understand what hardware and software is in use across the estate and by whom, as well as detailed information such as whether it is supported by the vendor, whether hardware is still under warranty, and what the relationship is between these technologies. It is only then that they can effectively secure their complex networks.&lt;/p&gt;

&lt;p&gt;Find out more about how &lt;a href="https://www.ivanti.com/en-gb/en-gb/en-gb/industries/higher-education" target="_blank"&gt;Ivanti can help protect your university IT environment here&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 19 Feb 2020 21:02:04 Z</pubDate></item><item><guid isPermaLink="false">c5f07174-b204-428a-9bef-a07f8b5af967</guid><link>https://www.ivanti.com/en-gb/blog/protecting-universities-in-today-s-cyber-threatscape</link><atom:author><atom:name>Andrew Brickell</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/andrew-brickell</atom:uri></atom:author><category>Security</category><category>Universities</category><title>Protecting Universities in Today’s Cyber Threatscape</title><description>&lt;p&gt;At a time when organisations across all industries are on high alert for the risk of cyberattacks, it’s no surprise that digital security is a key priority for educational institutions worldwide. The intricate mix of on- and off- campus students and staff, university and user-owned devices means these organisations have one of the most complex IT environments around, which is extremely difficult to protect from security threats.&lt;/p&gt;

&lt;p&gt;Therefore, it isn’t surprising to see that a recent &lt;a href="https://repository.jisc.ac.uk/7557/1/cyber-security-posture-survey-results-2019.pdf" target="_blank" rel="noopener"&gt;Jisc report&lt;/a&gt; reveals a 10% increase, since 2017, in universities with dedicated cybersecurity leaders, showing their desire for improvement in this area.&lt;/p&gt;

&lt;p&gt;That being said, these institutions can still implement additional measures to ensure their cybersecurity strategy is robust enough to mitigate the ever-evolving risks brought about by the digital era.&lt;/p&gt;

&lt;p&gt;Below are three key areas of cybersecurity universities should focus on:&lt;/p&gt;

&lt;h3&gt;Patching the Weak Spots&lt;/h3&gt;

&lt;p&gt;It’s no secret that cybercriminals are becoming more and more skilled – for example, the average time it takes them to exploit vulnerabilities is decreasing, making it challenging for organisations to remediate in such tight timeframes. Interestingly, Gartner has predicted that, by 2022, 90% of vulnerabilities exploited will be those known to the business. This may be because, although staff are aware of these system weaknesses, they aren’t always around to promptly react to attacks: &lt;a href="https://repository.jisc.ac.uk/7557/1/cyber-security-posture-survey-results-2019.pdf" target="_blank" rel="noopener"&gt;67% of IT university workers&lt;/a&gt; aren’t available 27/4 to respond to security incidents.&lt;/p&gt;

&lt;p&gt;The situation is made more critical by the absence of suitable technology to ensure around-the-clock protection – in fact, only &lt;a href="https://repository.jisc.ac.uk/7557/1/cyber-security-posture-survey-results-2019.pdf" target="_blank" rel="noopener"&gt;28% of universities&lt;/a&gt; implemented a Security Information and Event Management System (SIEM). So, while HE organisations are more likely to report security incidents than those in further education, whether they actually respond to these incidents is up to the good will and dedication of security staff – of which there is a shortage.&lt;/p&gt;

&lt;p&gt;To ensure an effective and constant defence against cyberattacks, universities need to up the ante on the patching front. Modern patching solutions not only provide protection from malware and other threats, they also help garner valuable insights. For example, Ivanti Patching Intelligence provides metrics that help staff understand risks, creating a simple view of what patches are required, driving more informed patching decisions.&lt;/p&gt;

&lt;h3&gt;Controlling Access and Applications&lt;/h3&gt;

&lt;p&gt;Within any organisation, ensuring users are able to access the necessary resources to do their work is vital. This is particularly true in universities, where technical difficulties can hinder students’ ability to complete coursework, meet deadlines, and make full use of services they pay significant fees for.&lt;/p&gt;

&lt;p&gt;For security reasons, some universities require students to go through long and tedious processes to gain crucial access privileges – sometimes having to wait days before their request is fulfilled. Furthermore, some institutions forget to revoke access rights from student or staff members who have left the organisation, meaning they can still view sensitive information and utilise private servers.&lt;/p&gt;

&lt;p&gt;Modern identity management solutions, such as Ivanti’s Service Manager, are able to automate the entire access provision process, empowering students to request and obtain privileges within 40 seconds. The access is then automatically revoked after a set period of time. It’s clear how this approach not only allows users to be work efficiently, but also enhances the organisation’s security.&lt;/p&gt;

&lt;p&gt;Keeping on top of trusted and untrusted applications is also vital – though it’s easier said than done. Disabling potentially dangerous applications may be possible for businesses, where employees are expected to only use company resources to do their job. But staff and students, who are largely based on campus, also use university networks for non-work-related matters. Thankfully, this aspect, too, can be regulated with technology. Ivanti Application Manager can independently identify unsecure applications and prevent them from running. In this regard, inventory is key. Universities must have clear visibility of what devices and softwares are utilised within their network, in order to effectively manage and protect them.&lt;/p&gt;

&lt;h3&gt;Preventing Social Engineering Attacks&lt;/h3&gt;

&lt;p&gt;To protect universities from cyberattacks, relying solely on latest-generation security technology is not enough. Educating staff and students to identify threats and handle them appropriately is just as important.&lt;/p&gt;

&lt;p&gt;Cybercriminals often employ social engineering attacks, disguised as innocuous emails, for example, inviting unwitting users to click through fraudulent links and download viruses. The Jisc report mentioned above indicates phishing as one of the top threats experienced within higher education. Therefore, educational institutions should work to keep students, teachers and all other employees up to date on new cyberattack trends – so that they are constantly alert and avoid exposing the organisation to risks of this kind. Interestingly, 48% of universities leverage phishing simulations to train users to detect and correctly respond to suspicious emails.&lt;/p&gt;

&lt;p&gt;University networks are navigated by a multitude of users across all ages, some more tech-savvy than others. That’s why phishing awareness and defence should be a core aspect of a sound security strategy.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Institutions in higher education have incredibly complex IT infrastructures and defending them from today’s digital threats is no easy feat. However, with the right technology and the right mindset, these organisations can navigate today’s cyber minefield and ensure effective protection.&lt;/p&gt;

&lt;p&gt;Find out more about how &lt;a href="https://www.ivanti.com/en-gb/en-gb/en-gb/industries/higher-education" target="_blank"&gt;Ivanti can help protect your university IT environment here&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Mon, 25 Nov 2019 21:45:04 Z</pubDate></item><item><guid isPermaLink="false">3f4b8d37-05db-414b-be59-a717278d70c4</guid><link>https://www.ivanti.com/en-gb/blog/taking-care-of-business-how-rapid-logon-times-can-improve-patient-care</link><atom:author><atom:name>Andrew Brickell</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/andrew-brickell</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><title>Taking Care of Business – How Rapid Logon Times Can Improve Patient Care</title><description>&lt;p&gt;According to Britain’s top GP, Professor Helen Stokes-Lampard, it can take her up to &lt;a href="https://www.dailymail.co.uk/health/article-7609931/Britains-GP-reveals-takes-17-MINUTES-switch-computer.html" target="_blank" rel="noopener"&gt;17 minutes&lt;/a&gt; to logon to her computer at her NHS practice. By today’s standards, that’s an incredibly long time but when you also consider that the 17 minutes could be better spent on consulting a patient and improving patient outcomes, it’s crystal clear that the NHS is in need of efficiency-boosting solutions.&lt;/p&gt;

&lt;p&gt;What’s the main culprit of this sluggish IT performance? Well, most NHS Trusts are still running on tired and outdated Windows 7 operating system (OS) which is scheduled to reach End of Life (EOL) in January 2020. This means that after this date, Windows will no longer support this product or provide vital patches to keep the system secure. This is casting a dark cloud of concern over the NHS as only a few months ago, Jackie Doyle-Price, former Department of Health and Social Care minister stated that the NHS operates about &lt;a href="https://www.publictechnology.net/articles/news/three-quarters-nhs-computers-still-running-windows-7-less-six-months-support-cut" target="_blank" rel="noopener"&gt;1.37 million PCs&lt;/a&gt; with at least 76% of them still running on Windows 7. This in the case for Professor Stokes-Lampard who also contends with the unpredictability of her computer crashing daily. What’s more concerning is that 2,300 NHS computers still operate on Windows XP for which support ended five years ago!&lt;/p&gt;

&lt;p&gt;Limited budgets and austerity play an important role in the type of IT equipment deployed within an organisation. However, using legacy technology within such a critical industry leaves the door wide open to severe vulnerabilities and cyberattacks. This can see a breach of sensitive, public data being accessed, leaving the NHS on the receiving end of a substantial GDPR fine. We only need to look as far back as the 2017 WannaCry attack to see this in practice. This week-long IT cyberattack saw over 19,000 appointments and operations cancelled, crucially costing the NHS almost &lt;a href="https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.theguardian.com%2Fsociety%2F2018%2Fdec%2F09%2Fnhs-banned-from-buying-any-more-fax-machines&amp;amp;data=02%7C01%7Csarah.lewis%40ivanti.com%7C06266e328b494d96e5bd08d75942fa7f%7Ce5208e76dd1247f09541c9b45afaffe6%7C1%7C1%7C637076016581720178&amp;amp;sdata=v8Hf9ybQQ5a1fr8sKjK74wMozGsUCoM6PaEujy7Y81Y%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;£20m in lost patient care and £72m during the aftershock&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The good news is that there are ways to overcome this headache. One such tool is our &lt;a href="https://www.ivanti.com/en-gb/products/environment-manager" target="_blank"&gt;Environment Manager&lt;/a&gt;. Engineered to move redundant actions away from logon and apply them on-demand, organisations can quickly access their desktop. This has seen companies secure up to a 90% reduction in logon times, allowing them to improve user experience and increase productivity. For the NHS, this could enable practitioners to maximise their face-time with customers and importantly, improve patient care. Utilising Environment Manager, users can seamlessly migrate from Windows 7 to Windows 10 with minimal downtime and the assurance that personal settings will cross over onto the upgraded desktop. For the NHS, this can save precious time as healthcare professionals don’t need to waste time dragging and dropping shortcuts.&lt;/p&gt;

&lt;p&gt;It goes without saying, health data is extremely private and should be protected at all costs, as Matt Hancock, Secretary of State for Health and Social Care, concurred in his &lt;a href="https://www.gov.uk/government/speeches/my-vision-for-a-more-tech-driven-nhs" target="_blank" rel="noopener"&gt;speech&lt;/a&gt; at NHS Expo 2018. During his keynote session, he announced plans to introduce a ‘digital revolution’ where the NHS cybersecurity will be stringently protected. This is encouraging news as clinical staff will no longer waste countless hours resolving IT issues and instead, focus on patients.&lt;/p&gt;

&lt;p&gt;Although the situation may seem bleak, there is light at the end of the tunnel. In order to stop 17-minute logons becoming the industry standard, the NHS needs to invest in new technologies that can drive greater operational efficiencies. These may require an initial up-front cost but by enhancing its cybersecurity, the NHS can avoid losing thousands in the long-run.&amp;nbsp;&lt;/p&gt;</description><pubDate>Thu, 31 Oct 2019 19:32:02 Z</pubDate></item></channel></rss>