Upload
seqrite
View
478
Download
3
Embed Size (px)
Citation preview
Enterprise Security Solutions by
IMPORTANCE OF CYBERSECURITY
IN EDUCATION SECTOR
1
Enterprise Security Solutions by
INTRODUCTION
Internet is one significant element of
many higher educational institutions.
Online services have become key to the
modern learning and teaching
environment.
With plethora of connected devices and
increased utilization of Internet, higher
educational institutions are exposed to
risks that impact their information and
data security: cyber threats.
2
Enterprise Security Solutions by
EDUCATION SECTOR HOLDS HUGE DATABASE AND
PERSONAL INDENTIFIABLE INFORMATION (PII)
The security in the education sector is incredibly important
as the information collected by these institutes can be
misused by hackers. The database comprises of:
• Students' personal data such as email id, home address,
contact number, financial information, etc.
• Students' educational data such as projects, marks, etc.
• Admission details
• Examination details
• Administration details
• Institute's employee details
• Financial data of the Institute
3
Sources: the journal, education dive, smart brief, ico.org.uk, BLI
13% of educational institutions in US faced ransomware attacks
on their networks in the past 12 months (as per examined by
Bitsight Insight report).
According to the US Department of Justice Statistics, 4000 ransomware
attacks occur on a daily basis in US alone.
Education industry is facing increasing number of data breaches and cyber attacks
as it holds large volume of personal and financial data.
As per BLI (Breach Level Index), 1.69% of total records stolen/lost by industry
is captured by education sector with a rise of 1.37% in 2017.
In January 2016, the
official website of the
Indian Institute
Managament-
Ahmedabad (IIM-A) was
hacked where the
hackers released the
result of 2015 CAT
exams of about
2,00,000 students.
19% of data breaches are caused by
human error and 32% of system
glitches. A rise of 20% in data breach
has been observed through emails sent
to wrong recipient.
11% of all data breaches were recorded in education industry alone.
A whooping number of 3,153,818 data records were compromised in
education industry in the year 2016.
According to a new study, a data breach in education sector costs $245
per compromised record.
4
Enterprise Security Solutions by
Cyber Security Incidents in Indian Educational Institutions
5
TYPES OF DATA BREACHES THAT
IMPACT EDUCATION SECTOR
6
Hacking and malware
Uninteded disclosure
Portable device
Stationery device
Physical loss
Insider
Unknown
36%
30%
17%
7%
5%
3%1%
Source: Advisory
Source: advisroy.ey.com
Enterprise Security Solutions by
TOP 5 SECURITY
THREATS IN EDUCATION
SECTOR
7
Enterprise Security Solutions by
#1
Source: Bitsight Insights, the guardian
RANSOMWARE
In 2016, education
industry suffered a huge
rise in ransomware
attacks. After
healthcare industry,
education sector has
become the biggest
target for cyber
attackers. 13%13%of total ransomware
attacks were
experienced by
education sector in
2016
In June 2017,
University College
of London was hit
by a ransomware
attack, which
brought down the
university's shared
drives and student
management
system.
“
8
#2PHISHING
Phishing attacks occur
when a recipient is
tricked to click on a
suspicious or malicious
link sent through email.
37% of data
breaches occur
due to email sent to
wrong recipient.
Sources:
Forbes, Columbia Missourian 9
In January 2017, the
Westminster College of
Columbia fell victim to the
W-2 Form phishing scam. An
employee accidentally
released other employees'
confidential information to a
third party, compromising
their identities.
Young adults are
among those most at
risk at being the
victim of a phishing
scam that results in
malware or
ransomware
downloads.
37%
“
Enterprise Security Solutions by
#3Higher educational
institutes store huge
amount of data. The data
generated by the students
in the university
ecosystem is the main
reason they are being
targeted by the hackers.
Source:
id theft center
CLOUD
SECURITY
Educational institutions are
becoming highly dependant
on cloud computing. The
increasing utilization of cloud
computing equally enhances
the risk of security and
protection of sensitive
information.
“
10Sources:id theft center, security score card
The US alone has
experienced 11.3%
breaches in the education
sector in the first half 0f
2017.
Enterprise Security Solutions by
#4
Sources: ForbesSource:
BYOD
Higher educational
institutions are
increasingly supporting
BYOD in their campus.
BYOD comes with
multiple security
challenges:
-Protection against
devices which are
infected with viruses
-Downloading
unauthorized content
-Social media and access
to malicious websites
BYOD culture enables
students to access multiple
malicious sites which are
often targeted with viruses
and malware.
Security
Issues
11
PROBLEMS WITH BYOD
Network
Overload
Enhanced
Tech
Support
PASSWORD
Most of the educational
institutes are now offering
open Wi-Fi network along
with BYOD policies.
Students power up their
phones, laptops and
tablets using open and
easily hackable Wi-Fi
network and putting all of
their personal information
on these devices.
PROBLEMSNot secure
network
Reusing similar
or weak
passwords
Open
access
#5Educational institues are
considered as a fertile place
for password-related cyber
crimes and it is all because
of the habit of using the
same password and
username/email for
everything. According to a
recent report, millions of
stolen and fake email
credentials are sold on the
dark web.
“
12
Source: help net security
Sources:
help net security, IT governance USA,
Forbes
REASONS FOR PASSWORD PROBLEMS ON WIRELESS NETWORK
Enterprise Security Solutions by
Helps mitigate all such security threats in the education sector with its range of
Dynamic, Scalable, and Future Ready solutions:
SEQRITE Endpoint Security
SEQRITE Unified Threat Management Solution (TERMINATOR)
SEQRITE Mobile Device Management
SEQRITE Data Loss Prevention
13
Enterprise Security Solutions by
Endpoint Security FEATURES
PATCH MANAGEMENT
Enables IT administrators to check and
install missing security patches for all
applications installed on enterprise endpoints
from a centrally managed console.
WEB SECURITY
Automatically blocks websites infected with
malware or designed for phishing attacks.
APPLICATION CONTROL
Categories of applications can be authorized or
unauthorized from being executed within the
network.
DATA BACKUP AND RESTORE TOOL
Automatically and periodically (multiple times
a day), takes a backup of all important and
well-known file formats like PDF and Microsoft
Office files that are present on a computer.
RISKS MITIGATED
RANSOMWARE ATTACKS
INSIDER THREATS
CORE PROTECTION (IDS/IPS & FIREWALL)
IDS/IPS blocks threats that exploit software
vulnerabilities and Firewall thwarts malicious
attempts to access the corporate network.
BEHAVIOR DETECTION
Detects and blocks unknown viruses and
malware in real-time.
INFECTED WEBSITES
PHISHING ATTACKSINFECTED EXTERNAL DEVICES
SECURITY VULNERABILITIES
14
Enterprise Security Solutions by
Data Loss Prevention
ADVANCED DEVICE CONTROL
- Configure access policies for more than 25 device
types.
- Blocks unverified devices.
- Prevents autorun infections.
ENHANCED PRIVACY PROTECTION & COMPLIANCE
- Identifies Office documents based on their origin.
- Prevents data leakage propagated by worms, Trojans,
and other malware threats.
- Issues regular notifications to reinforce user behavior
on data security.
LOWER COMPLEXITY & COST OF DEPLOYMENT
- Easy integration with existing Seqrite EPS.
- Defines DLP security polices and reports across multiple
endpoints in scattered locations.
- Centralized management and monitoring of crucial business
data.
CONTENT AWARE PROTECTION
- Monitors all actions on confidential files.
- Instantly notifies admins about unauthorized data leakage.
- Ensures that no confidential data leaves the organization.
- TARGETED ATTACKS
- HUMAN ERROR
- USB DRIVES
- WEB EMAIL
DATA LEAKAGE caused by:
RISKS MITIGATED
FEATURES
15
- BLUETOOTH
- CLOUD STORAGE
Enterprise Security Solutions by
TERMINATOR
GATEWAY ANTIVIRUS
Scans all incoming and outgoing network traffic
at the gateway level. Augments existing virus
solutions by reducing the window of
vulnerability (WoV).
FIREWALL
Admins can permit or block access for traffic
between internal and external networks
based on enterprise compliance policies.
VIRTUAL PRIVATE NETWORK
Provides IT administrators with a means for
secure communications between the
company's remote users and for building site-to-
site connections.
IDS / IPS
Scrutinizes network traffic in real-time and
prevents a broad range of DoS and DDoS
attacks before they penetrate the network.
DoS & DDoS ATTACKS
INTERNET DOWNTIME
GATEWAY MAIL PROTECTION
Scans incoming/outgoing emails or attachments
at the gateway level to block spam and phishing
emails before they enter the network.
CONTENT FILTERING
Allows blocking of non-business related websites
including streaming media sites, downloads,
instant messaging, etc., in order to reduce
unnecessary load on enterprise bandwidth.
MALICIOUS INTERNET TRAFFIC
MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS
ADVANCED PERSISTENT THREATS
FEATURES
RISKS MITIGATED
16
Enterprise Security Solutions by
MDM
APPLICATION CONTROL
Apps can be remotely managed/ installed/
blocked in order to maintain policy compliance
and productivity within the network.
VIRTUAL FENCING
Preset virtual boundaries that restrict device
usage and functionality. These boundaries can
be triggered by geolocation-based, time-based
or Wi-Fi network-based data.
UNIFIED MANAGEMENT CONSOLE
Manage and synchronize all connected devices
through a centralized graphical interface.
NETWORK DATA MONITORING
Admins can view details of Internet data used
over mobile networks or Wi-Fi. They can also
monitor all incoming and outgoing calls and
SMSs on enterprise mobile devices.
DATA THEFT FROM LOST/
STOLEN MOBILE PHONES
ANTI-THEFT
Prevents misuse of lost/stolen mobile phones by
remotely tracking and locking them. Also prevents
data breach by remotely erasing the phone’s data.
INTERNET THREATS
JAILBREAKING/ ROOTING
OF MOBILE DEVICES
MALICIOUS MOBILE APPS
SECURITY MANAGEMENT
Features such as browsing protection, web
filtering, anti-theft, and geolocation tracking
ensure the safety of enterprise devices.
MOBILE MALWARE
BAD SECURITY HYGIENE
FEATURES
RISKS MITIGATED
17
Enterprise Security Solutions by 18
COMPANY OVERVIEWQUICKHEAL Journey
• Company renamed as Quick Heal
Technologies Pvt. Ltd. from CAT
Computer Services Pvt. Ltd.
• Quick Heal sets up Technical Support
Centre at Nashik
2006 - 2007
• Quick Heal starts Radio Campaign
• Quick Heal starts its first branch in Nashik
2002 - 2004
• Private Equity Investment firm Sequoia
Capital, invests in Quick Heal
• Quick Heal recognized by CRN India as No.1
Channel Champion
2009 - 2010
• Quick Heal becomes Microsoft’s certified partner
• Quick Heal hosts AAVAR International Security
Conference in India
2008
• Incorporates Quick Heal in Kenya
• Incorporates Quick Heal in Japan
• Quick Heal acquires SurfCanister Sandbox technology
from Apurva Technologies, India
2011
• Launches Quick Heal Mobile
Security
• Launches Quick Heal Endpoint
Security
• Quick Heal acquires behavior based
technologies from Nova Shield Inc.
UK
• Incorporates Quick Heal in Dubai
• ISO 9000
2012 - 2013
• Launches MDM (Mobile Device
Management)
• Launches Terminator (UTM) gateway
security appliances
• Launches free mobile security for Android
• Quick Heal invests in Wegilant Net
Solutions Pvt. Ltd, India
2014
• Launches Seqrite a brand encompassing security
products for Business Enterprise customers
• Quick Heal invests in ‘Smartalyse Technologies Pvt.
Ltd., India’
• Launches Quick Heal Gadget Securance for Mobile
security + insurance
• Launches Fonetastic for Mobile security
2015
• Incorporation as ‘CAT Computer
Services Pvt. Ltd.’
• Launch of ‘Quick Heal’ DOS version
• Launch of ‘Quick Heal’ Windows
version
1995 - 1998
• Listing on BSE and
NSE exchanges
• ISO 27001
• ISO 20000
• Launches ‘Seqrite
Services’ and ‘Quick
Heal Academy’
20162017• QH Academy signs
MoU with Pune
University, GFSU
and Chitkara
University, Punjab
• Deploys Dell EMC
XtremoIO Platform
• Collaborates with
CERT-In for ‘Cyber
Swachhta Kendra’
Enterprise Security Solutions by 19
Head Office & R&D CenterPune
Quick Heal –
63 offices &
warehouses across
35 cities in India
COMPANY OVERVIEWEXTENSIVE REACH & PRESENCE
INDIA (HO)Quick Heal Technologies
Ltd.
JAPANQuick Heal Japan KK.
UAEQuick Heal Technologies
(MENA) FZE
KENYAQuick Heal Technologies
Africa Ltd.
USAQuick Heal Technologies
America Inc.
Enterprise Security Solutions by 20
COMPANY OVERVIEWStrong Brand Recognition and Recall
24.5 m+Product Licenses Installed
7.3 m+Active Licenses across more
than 80 countries
2.0x GrowthIn Active Licenses
30% +Retail Market Share in India
Preferred Choice of
IT technicians for PC Virus
Cleaning
Enterprise Security Solutions by
THANK
YOU
Protecting your business from
today’s attacks and
tomorrow’s threats.
21
Enterprise Security Solutions by 22
THANK YOU