BitLyft for Higher Education

College Expands IT Team with BitLyft Cybersecurity

Organization: Large Community College

Total Student EnrollmentTotal student enrollment
Staff MembersStaff members
Programs and CertificatesPrograms and certificates

Log Sources: 17 with 420+ individual sources from: ExtremeXOS, Palo Alto Firewall, Microsoft Exchange 2016, Office 365 Management and Message Tracking, IIS, Apache Tomcat, MySQL, and Oracle WebLogic
Key Impacts:

  • Reduced number of phishing and spam emails
  • Illuminated gaps in the college’s network security
  • Set up real-time alarm notifications
  • Provided instruction to fix vulnerabilities

The Challenge:

In an age where cyberattacks abound, many colleges and universities find themselves inadequately prepared to deal with the ever-increasing threat vectors. One of the most common challenges faced in the higher education industry is a lack of cybersecurity training. A public community college located in the United States, found itself in a similar situation. They had a decent-sized IT staff of nearly 20 employees, but it (like many other institutions) lacked the necessary focus and training in cybersecurity. The community college had existing security practices in place, like firewalls, but they knew they lacked the overall knowledge needed to properly protect the university’s network.

In addition, many of the college’s students and staff were receiving phishing emails and spam through their Office 365 system. To make matters worse, recipients were clicking on the malicious links. “Some of our students were starting to lose $2,500 to $3,500 from these scams,” said the CIO of the community college. “This problem cascaded until it even began to affect our Exchange Server.”

The community college knew it needed help, but hiring an entire internal security team was not a practical solution. Like many other colleges, they had a limited budget and knew it needed to spend its resources wisely. The college could go through the process of onboarding additional staff members and pay the generally high salary range for these employees, or it could funnel its resources into a more cost-effective solution like a third-party vendor.

“I thought bringing in someone that already had an established security relationship would benefit the college more than trying to put together an entire security team,” said the CIO. With this knowledge in hand, the college began its search for a partner.

To see how partnering with BitLyft helped alleviate these challenges download the PDF below:

More Reading

SIEM as a Service

What is SIEM-as-a-Service? (A Guide To Managed SIEM Service)

In today’s changing technological and economic landscapes, cybersecurity has never been more important. But how do you keep your organization’s information secure while maintaining compliance? SIEM-as-a-Service might be the answer. …

What is SIEM-as-a-Service? (A Guide To Managed SIEM Service) Read More »

SIEM-as-a-Service vs. SIEM On-Prem: Pros & Cons

Security Information Event Management, or SIEM-as-a-Service, technology is a crucial part of any organization’s cybersecurity strategy. But should you install your SIEM tools on-prem? Or should you rely on a …

SIEM-as-a-Service vs. SIEM On-Prem: Pros & Cons Read More »

Managed SIEM Service: Do I Get My Data?

SIEM tools can be a crucial part of securing your organization’s network. And a managed SIEM service can be an efficient and affordable way to utilize SIEM security. But here’s …

Managed SIEM Service: Do I Get My Data? Read More »

Managed SIEM Services

How Mature Is Your Managed SIEM Service?

Here’s a little trick to help you determine whether your managed SIEM is a mature solution: ask your service provider what the ‘M’ in SIEM stands for. What you may …

How Mature Is Your Managed SIEM Service? Read More »

About the Author


Emily Miller

Scroll to Top