September 26, 2016 By David Strom 2 min read

Almost two-thirds of British universities that responded to a Freedom of Information (FOI) request earlier this summer admitted to suffering at least one ransomware attack in the past year, according to SentinelOne. That’s not particularly surprising given the widespread use of this vector in cybercrime.

Ransomware Runs Rampant

What is interesting is how prevalent these attacks have been throughout academia: Many of the institutions suffered multiple such attacks in the last 12 months. One campus in particular — Bournemouth University — suffered 21 attacks over the year. Only 7 percent of the institutions said they haven’t ever been attack victims.

Attackers demanded ransoms ranging from $100 to more than $3,000. Not one institution admitted to paying up; many universities restored the encrypted data from backups. However, in general, overseas victims of ransomware are more likely to pay attackers to return their stolen data. This is because overseas attacks tend to hit higher-level staff members with sufficient clout to authorize the payments.

Another reason for the rise in ransoms has to do with the potential reputation harm. Universities are often competing for top candidates, high-profile faculty and staff, and endowment funds — the last thing they need is news of a successful cyberattack dragging their name through the mud.

A Global Problem for Academia

Sadly, the situation in Britain mirrors what other educational institutions around the world are also experiencing. Earlier this summer, according to Fortune, the University of Calgary paid attackers $16,000 to unlock a batch of stolen emails. The stolen information reportedly included vital data for academic research that hadn’t been backed up.

Academia is a rich target for cybercriminals. “Email addresses for staff are often in the public domain, which means that potentially the entire staff could be targeted at once, increasing the chance for successful infections,” Gianluca Stinghini, an assistant computer science professor at University College London, told SentinelOne.

Ramping Up Ransomware Protection

Academics are seldom early adopters of security technology. They are typically more open to promoting information sharing, which can make them vulnerable to malware that can easily spread across enterprise networks.

Several universities that were polled refused to answer the FOI requests, but the numbers revealed speak for themselves. Clearly, the time has come for universities to step up their game when it comes to protecting against ransomware.

More from Data Protection

How secure are green data centers? Consider these 5 trends

4 min read - As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers.KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented a data center sustainability program, which often includes implementing a green data center.“Responsibilities for sustainability are increasingly being passed down from CIOs to infrastructure and operations…

Why maintaining data cleanliness is essential to cybersecurity

3 min read - Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision-making on all levels.However, like any other piece of company equipment, data can degrade over time and become less valuable if organizations aren’t careful. What’s even more dangerous is that neglecting data hygiene can expose organizations to a number of security…

Router reality check: 86% of default passwords have never been changed

4 min read - Misconfigurations remain a popular compromise point — and routers are leading the way.According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing emails and stealing staff data when supposedly secure devices can be accessed using "admin" and "password" as credentials?It's time for a router reality check.Rising router risksRouters…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today