Organization: Large Community College
|Total student enrollment
|Programs and certificates
Log Sources: 17 with 420+ individual sources from: ExtremeXOS, Palo Alto Firewall, Microsoft Exchange 2016, Office 365 Management and Message Tracking, IIS, Apache Tomcat, MySQL, and Oracle WebLogic
- Reduced number of phishing and spam emails
- Illuminated gaps in the college’s network security
- Set up real-time alarm notifications
- Provided instruction to fix vulnerabilities
In an age where cyberattacks abound, many colleges and universities find themselves inadequately prepared to deal with the ever-increasing threat vectors. One of the most common challenges faced in the higher education industry is a lack of cybersecurity training. A public community college located in the United States, found itself in a similar situation. They had a decent-sized IT staff of nearly 20 employees, but it (like many other institutions) lacked the necessary focus and training in cybersecurity. The community college had existing security practices in place, like firewalls, but they knew they lacked the overall knowledge needed to properly protect the university’s network.
In addition, many of the college’s students and staff were receiving phishing emails and spam through their Office 365 system. To make matters worse, recipients were clicking on the malicious links. “Some of our students were starting to lose $2,500 to $3,500 from these scams,” said the CIO of the community college. “This problem cascaded until it even began to affect our Exchange Server.”
The community college knew it needed help, but hiring an entire internal security team was not a practical solution. Like many other colleges, they had a limited budget and knew it needed to spend its resources wisely. The college could go through the process of onboarding additional staff members and pay the generally high salary range for these employees, or it could funnel its resources into a more cost-effective solution like a third-party vendor.
“I thought bringing in someone that already had an established security relationship would benefit the college more than trying to put together an entire security team,” said the CIO. With this knowledge in hand, the college began its search for a partner.