Close

See How IT Leaders Are Tackling AI Challenges and Opportunities

New research from CDW reveals insights from AI experts and IT leaders.

Jul 23 2025
Security

Is Segmentation Higher Education’s Most Realistic Defense Against Ransomware?

Students bring thousands of new devices to campus every year. Keeping those devices restricted from valuable PII and research data is critical to creating a secure environment.

Before you know it, carloads of eager students, proud parents and all the dorm room decor a young person could ever need will be pulling into your campus, ready to start an exciting journey into the next phase of life.

In those cars will also be a seemingly endless number of network-connected devices. There will be laptops, smartphones, gaming consoles, smartwatches, tablets, smart speakers, virtual reality headsets and other Internet of Things (IoT) gadgets. As their moving boxes get unpacked, students will want to connect to the campus network and the high-speed connectivity that powers everything they do.

It sounds nice, but all of it is a bit of a waking nightmare for IT departments. With each one of those devices comes new security risks — hackers who love feasting on higher education’s vulnerable networks, or even devices that come to campus pre-infected with malware. Plug those devices into a campus network, and suddenly you’ve created a gaping hole in all your cyberdefenses.

At the end of the day, there’s little that IT security staff can do to guarantee the security of student devices. After all, security is in the hands of the individual user more than anyone else. But even if it’s a matter of when, not if, a student credential is compromised or device is infected, there’s plenty IT can do to minimize the damage and keep the campus operational.

Click the banner below to learn how managed services can optimize university defenses.

 

Device Registration Applies Zero-Trust Principles To Bolster Security

Access management is a must-have, and it’s become so common that the complaints about being forced to use multifactor authentication have quieted, especially as university communities become more familiar with the risks of cybercrime.

Authenticating devices is equally as critical to IT teams. Cataloging the Media Access Control address on every one of those devices is step one to get logged on to a secure campus network. From there, just as with user authentication, devices must be verified by a credentialed user each time they try to connect. That’s so that if — or, more likely, when — a user’s credentials and/or their device are compromised, the suspect MAC address can be tracked down, and the offending device can be quarantined.

This is only possible, however, if higher education network environments are properly segmented. A freshman who just moved into a dorm room can’t, under any circumstances, connect to the same network that stores financial information for the college, for example.

LEARN MORE: Identity and access management addresses the challenges of complex IT environments.

Network Segmentation Keeps the Most Valuable Data Safe

One of the reasons higher education is such a frequent target for cyberattackers is that educational networks are open by design. That’s counter to the zero-trust philosophy but central to the higher education philosophy that promotes collaboration, free thought and transparency. Those things aren’t likely to change anytime soon.

So, if higher education networks are going to be more open and vulnerable, packed with users who may or may not have great cyber hygiene, there are going to be breaches. The goal becomes limiting the damage from those breaches.

Think about public safety offices, which have IoT cameras, license plate readers, biometrics and other tools they use around campus. Those devices must connect to a network, but not the main university network, since a whole host of protected data is collected by those devices. They need their own network, data storage — on-premises or in the cloud — and credentialing procedure. Same goes for a researcher organizing a project, especially one that leans on technology or has to do with technology-related research. Those findings are proprietary to the researcher and/or the institution, and in some cases could also be privileged information (a university contract with the Department of Defense, for example).

Keeping those two networks off the main campus network for students is crucial, as is separating those two networks — public safety and research — from each other. And there are countless other examples and potential complexities, for instance when research is being done across several campuses, or when a student holds a job in the financial aid office.

Segmenting networks requires some cooperation between central IT and individual offices and departments on campus, some of which may have been enjoying a certain level of autonomy when it comes to technology.

Cooperation is necessary because a clear roadmap must be available in case of a network intrusion. In some cases, a third-party partner can come in and offer managed services to conduct an assessment, draw a clean roadmap and recommend a plan.

If, for example, a device can be identified as the source of malware, it’s vital that the IT security staff and incident response team can look at that roadmap and understand where to make sure certain channels stay closed. Without the roadmap, it’s hard to tell if an infected device has been truly isolated.

This article is part of EdTech: Focus on Higher Education’s UniversITy blog series featuring analysis and recommendations from CDW experts.

sturti/Getty Images