Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

Information security in the education industry

Bring your own device in a secure learning environment.

In recent months, a big change has taken place in the education. At a fast pace, following online lessons and taking online lectures has become the norm. Digital resources contribute to a large degree to the availability of high-quality education so that students can complete the training successfully within the imposed time limit. The use of digital resources does, however, also imply that the preconditions in terms of cyber-security must properly be met. After all, it only takes one infected device to jeopardise the continuity of the teaching programme.

Conduct and awareness are decisive

Within education, conduct and awareness are important elements that contribute to a pleasant learning environment. In addition, these elements are also essential to the configuration of your cyber-security. In the 1980s and 1990s, digitalisation mostly took place in respect of the administrative processes, but nowadays it is impossible to imagine education without MOOC (Massive Open Online Courses), analyses based on student data, and adaptive learning environments. A good cyber-security solution is seamlessly in line with the processes within the education industry. The first step is, however, to ensure that students and employees are aware of a secure way of working and handling personal data. Tesorion has (online) training sessions available to teach employees basic knowledge when it comes to, for instance, the use of passwords, the sharing of account details, leaving a workplace behind unattended, or the sharing of data.

Within the education industry, it is also common practice that students, teachers, and support staff use their own devices, the so-called Bring Your Own Device (BYOD). Having insight into these devices that access and leave your network, making sure that all devices are provided with the latest software updates and patches, and, moreover, complying with legislation and regulations like the GDPR, result in considerable pressure on the IT organisation and in a juggle between short-term solutions and policy adjustments in the long term.

In recent years, educational institutions have been hit more than other organisations by a DDoS attack

Cyber-secure education

Tesorion Immunity

A good night’s rest for all, because Immunity detects and isolates automatically

Like at home, you do not want any uninvited guests inside. The same applies to undesired access to your computer network. For instance, at home you have a good lock on the door and, perhaps, an alarm system, perhaps even supplemented with cameras. Tesorion Immunity ensures that when uninvited guests gain access, they are detected and isolated automatically.
Tesorion Immunity does not allow anyone who represents a threat to your data to gain access. Even in case of already trusted devices, Tesorion Immunity pays attention to deviating behaviour and immediately reacts to threats by isolating an infected device. That is how security of your most precious assets should be organised.

Does it nonetheless go wrong? Stay calm and call +31 (0)88 27 47 800

Does your organisation or institution nonetheless become the target of hackers or the victim of malware? Then Tesorion is there for you to minimise or even to prevent the risk of damages. To this end we are equipped with our in-house T-CERT team.

Tesorion offers two solution approaches for a proactive solution to protect your business processes and data. You can choose between a solution administered in-company, Tesorion Immunity, or outsourcing of your cyber-security to our Security Operations Center (SOC).


Tesorion is equipped with a specialist Computer Emergency and Response Team (CERT). This team is available to you 24/7 to assist in case of digital contingencies. Tesorion is, moreover, part of Z-CERT, the Computer Emergency and Response Team specifically for the healthcare industry.

More information about CERT

Our SOC takes the work off your shoulders

Our cyber-security specialists of the SOC safeguard and monitor your business network, infrastructure, and applications continuously. On the basis of various events, Tesorion can detect and eliminate a cyber-attack in a timely fashion. This safeguards the continuity of your business operations.

More information about SOC

Unfortunately, cyber-threats are no longer something new. However, a truly coherent cyber-approach is.

Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.