Unclassified, sensitive research done at many leading technical universities in the U.S. can be a particularly enticing target for nation-states seeking to leapfrog their technological capabilities.
With cutting-edge research on quantum computing, artificial intelligence, robotics and other high-tech fields all happening in university laboratories, acquiring information before it is classified and contained in more hardened networks can be a valuable acquisition strategy.
To strengthen their security, universities should look to improve their risk management protocols and tools. By implementing a solid security framework, universities can mitigate their vulnerability to foreign threats.
Another option is to adopt a zero-trust model. In a zero-trust network, users only have access to specific applications. This helps keep adversaries from breaching a user’s account, moving laterally and gaining access to sensitive information.
Adversaries Infiltrate Universities to Reach Higher-Level Targets
Another attribute many universities share that makes them attractive targets for intelligence collection is that they are often well connected to policymakers, government researchers and nongovernmental organizations.
Cyberthreats to universities are not limited to APT40 and other Chinese espionage groups. Adversaries from Iran, North Korea, Russia and others may be trying to find ways to infiltrate universities.
As tech innovation becomes inseparable from military dominance, civilian researchers and students from around the world will be increasingly targeted.
This means it will be more important than ever for higher education IT leaders to regularly check for network vulnerabilities, train users and invest in next-generation technology to keep their campus networks safe.