Conduct and awareness are decisive
Within education, conduct and awareness are important elements that contribute to a pleasant learning environment. In addition, these elements are also essential to the configuration of your cyber-security. In the 1980s and 1990s, digitalisation mostly took place in respect of the administrative processes, but nowadays it is impossible to imagine education without MOOC (Massive Open Online Courses), analyses based on student data, and adaptive learning environments. A good cyber-security solution is seamlessly in line with the processes within the education industry. The first step is, however, to ensure that students and employees are aware of a secure way of working and handling personal data. Tesorion has (online) training sessions available to teach employees basic knowledge when it comes to, for instance, the use of passwords, the sharing of account details, leaving a workplace behind unattended, or the sharing of data.
Within the education industry, it is also common practice that students, teachers, and support staff use their own devices, the so-called Bring Your Own Device (BYOD). Having insight into these devices that access and leave your network, making sure that all devices are provided with the latest software updates and patches, and, moreover, complying with legislation and regulations like the GDPR, result in considerable pressure on the IT organisation and in a juggle between short-term solutions and policy adjustments in the long term.
In recent years, educational institutions have been hit more than other organisations by a DDoS attack
A good night’s rest for all, because Immunity detects and isolates automatically
Like at home, you do not want any uninvited guests inside. The same applies to undesired access to your computer network. For instance, at home you have a good lock on the door and, perhaps, an alarm system, perhaps even supplemented with cameras. Tesorion Immunity ensures that when uninvited guests gain access, they are detected and isolated automatically.
Tesorion Immunity does not allow anyone who represents a threat to your data to gain access. Even in case of already trusted devices, Tesorion Immunity pays attention to deviating behaviour and immediately reacts to threats by isolating an infected device. That is how security of your most precious assets should be organised.