home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,385 of 2,445   
   Mike Powell to All   
   Universities are struggli   
   14 May 25 07:59:00   
   
   TZUTC: -0500   
   MSGID: 1118.consprcy@1:2320/105 2c89cedc   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Universities are struggling with document security and hackers are taking   
   advantage   
      
   Date:   
   Wed, 14 May 2025 08:50:20 +0000   
      
   Description:   
   Almost 1 in 4 UK universities are cutting staff, slashing budgets, or making   
   redundancies. The last thing they need right now is a cyberattack. But heres   
   the problemtheyve never been more vulnerable.   
      
   FULL STORY   
   ======================================================================   
      
   Universities are already under immense pressure from financial constraints,   
   regulatory requirements, and accountability demandsthe last thing they need    
   is a cyberattack. Unfortunately, the standard approach to document management   
   has left many of them more vulnerable than ever. With AI making cyberattacks   
   more prolific and effective, a single misplaced document could have   
   devastating consequences. And thats just the tip of the iceberg.    
      
   Why? Cybercriminals know that universities often lack robust cybersecurity   
   measures. In fact, in 2024, a staggering 97% of universities experienced a   
   cyber-attack, leading to financial losses, reputational damage, and   
   disruptions to academic activities. In other words, attackers know where   
   universities are most vulnerableand theyre exploiting those weaknesses like   
   never before.    
      
   This article will explore how poor document management practices exacerbate   
   these risks, how modern solutions can reduce cyber threats, and the critical   
   steps universities must take to protect themselves.   
      
   When you dont get with the times   
      
   Many universities operate with woefully out-of-date IT systems. Its not   
   uncommon for staff to bypass the whole system and work with reams of paper on   
   their desks. In fact, a new report from the Higher Education Policy Institute   
   says that universities need an army of IT staff to keep systems from    
   crumbling under their own weight. Not only is this a burden on staff, but it   
   increases cyber risk.    
      
   That same report says that document management is one of the most significant   
   failure points.    
      
   Consider this: internal servers are unreliable, so staff turn to alternative   
   solutions. Personal email accounts become makeshift storage because   
   institutional servers cant be trusted. Physical documents, though tangible,   
   are easily misplaced or lost in transitexposing confidential data and    
   creating GDPR compliance risks. Whether its application forms, research   
   papers, or emails, without proper security measures, every document is a   
   potential vulnerability.    
      
   Unsurprisingly, humans are often the weakest link. A hastily scribbled   
   password on a sticky note, a list of student names and addresses that falls   
   out of a plastic binder, or a shared drive that is open to anyone with a link    
    all represent a way into university servers for enterprising cybercriminals.   
   Think about it: when thousands of students and faculty members are sending   
   documents to and from, its essential that this is underpinned by good    
   security systems.    
      
   Another growing headache for universities is shadow AI. When employees   
   struggle with outdated systems while managing increasing workloads, they turn   
   to any tool that boosts efficiencyeven if its unsanctioned or unsafe. Take    
   the professor using ChatGPT to assess one of hundreds of essays. Hidden    
   within a student essay might be personally identifiable information (PII).   
   Meanwhile, freely available open source large language models (LLMs), such as   
   Chinas DeepSeek, have been altered to contain malicious code implanted before   
   download.    
      
   And once cyber criminals have access to a university server, they can    
   observe, explore and map the network and its users. Undetected and free to   
   roam, they can seek out and obtain login credentials that gives them access    
   to other parts of the network. They may also set up backdoors so that they    
   can regain access once theyve enacted their plan.   
      
   Document management cant be overlooked   
      
   With risks like theseand with AI and machine learning becoming more advanced   
   and widespreadcybercriminals have more tools than ever to target    
   universities. AI tools not only lower the technological barrier for    
   attackers, enabling even less-skilled individuals to craft convincing    
   phishing emails or automate malicious code generation, but it also    
   facilitates deepfake audio and video, as well as adaptive malware designed to   
   evade detection.    
      
   More importantly, it accelerates the attack cycle. And cybercriminals know   
   that universities are often poorly equipped to handle a barrage of attacks.   
   According to the UK Governments 2024 Cyber Security Breaches Survey, around   
   60% of UK universities had suffered a cyber breach in the past yearmore than   
   the typical large businessand this was due to inadequate cyber strategies.    
      
   Proper document management systems can mitigate many of these risks. These   
   tools store and manage documents through a central, cloud-based server,   
   providing a secure environment for sensitive information. They also    
   facilitate the digitization of physical documents, making them easier to   
   manage. By automatically generating metadata for stored content, they enhance   
   searchability and prepare information for responsible AI and automation. Most   
   importantly, they enforce access rights, maintain audit trails, and support   
   regulatory compliance, reducing the risk of data breaches.    
      
   In other words, they ensure the right person has the right access to the    
   right documents and the right time. Some modern document management tools    
   have AI built in, making it easier to analyze and extract insights from   
   university data. Additionally, having AI tools within a secure environment   
   helps reduce the risk of Shadow AI.   
      
   Universities of the future    
      
   Document management systems help universities prepare for the future. Data   
   indexing and classification are essential for AI and automation. However,   
   these processes are only as effective as the data they are built uponmaking    
   it crucial to establish a strong foundation for growth.    
      
   Employees also appreciate having technology that works. Cumbersome document   
   management systems can be a drain on efficiency, impacting productivity and   
   distracting students and staff from meaningful work. With a well-implemented   
   document management system, staff can begin automating processessuch as   
   student onboardingallowing them to focus on what truly matters, engaging with   
   students and ensuring they settle in.    
      
   Imagine a world where admissions teams no longer struggle with managing   
   electronic signatures or distributing onboarding documentation. Lecturers,   
   too, can automate aspects of grading and reduce time spent on document   
   management, allowing them to prioritize teaching.    
      
   As AI and machine learning become more developed, universities will more   
   clearly recognize the ROI of implementing a document management system,   
   because they have the foundations on which to build. Content management   
   systems are also good because staff can drive their own automation workflows   
   through APIs and low-code applications  by leveraging ready-made templates    
   and automation solutions from community- and vendor-driven marketplaces. This   
   goes a long way in helping universities navigate the pressures they face   
   today.    
      
   Of course, implementing a document management system requires an initial   
   investment. However, these systems improve over time, and the reputational    
   and financial risks associated with a serious cyberattack can be    
   significantly reduced. Ultimately, universities can fund these improvements    
   by reallocating savings from reduced manual processes and avoiding the costly   
   consequences of a data breach.   
      
   The time to update was yesterday    
      
   Universities can no longer afford to ignore document management, especially    
   as competitors modernize and make better use of artificial intelligence and   
   machine learning. These threats will only grow over time. By addressing these   
   issues now, universities can save on costs, boost employee and student    
   morale, and refocus on what truly matters: education.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/universities-are-struggling-with-document-securi   
   ty-and-hackers-are-taking-advantage   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca