Jisc publishes cybersecurity posture survey 2018
Jisc publishes cyber security posture survey
Jisc surveyed 118 different institutions to gain a better understanding of the security posture of the UK’s education sector.
Cyber Security Posture Survey 2018 Findings
In summary, the biggest threat concerns according to these institutions were:
(1) Phishing and social engineering
(2) Ransomware and malware attacks
(3) Lack of awareness and accidents
These issues reported by both HE and FE, indicating human error remains a key problem.
A detailed overview of responses can be found on Jisc’s website: Cyber Security Posture Survey 2018 Research Findings
Jisc Framework Promotions
As part of the Jisc frameworks, KHIPU are offering a number of packaged promotions to help address the top threat concerns identified by the HE and FE community.
The packages form part of our zero vulnerability infrastructure offering that help organisations protect and prevent against cyberattacks. Our risk assessments address key areas within a network; Users, Infrastructure, Perimeter and Applications.
USERS: Free Phishing Cyber Risk Assessments available with all of the service packages.
INFRASTRUCTURE: Free Vulnerability Cyber Risk Assessment Scans available with all of the service packages.
Routing and Switching Framework – Lot 9 Palo Alto Networks
PERIMETER & APPS: Free Network Visibility Cyber Risk Assessment of your network including an Application Usage and Malware Risk Report.
*All promotions expire 21st December 2018.
Assess your environment’s risk to phishing attacks and determine user awareness training needs
Available via the Jisc single supplier framework:
Cyber Risk Assessment: Phishing
This cyber risk service enables you to understand your organisations exposure to phishing attacks, allowing you to implement sufficient staff training and cyber security enhancements.
KHIPU uses simulated phishing attacks to assess how users react to phishing emails so that the right level of awareness training can be provided to educate them on cyber security and breach prevention (personal and work related).
99% of vulnerabilities are known – identify, prioritise and patch them
Available via the Jisc single supplier framework:
Cyber Risk Assessment: Vulnerabilities
Our vulnerability assessment service will identify which of your systems are vulnerable to exploits and how to fix them.
This enables you to make informed decisions on which systems are most important to your organisation so you can prioritise and remediate them.
PERIMETER & APPLICATIONS
What applications are being used, are they a risk and have you been infected by malware
Available via the Jisc routing/switching framework
Lot 9 – Palo Alto Networks (direct award)
Visit our cyber security microsite for the education sector for more information, customer stories and more next-generation security for the next-generation
Cyber Risk Assessment: Visibility
Many perimeter security systems are unable to identify network traffic at the application level therefore cannot identify or protect against zero-day malware attacks, let alone enable you to determine what applications are being used by your workforce.
This service provides a risk assessment based on the analysis of the traffic traversing your network, taking into account the different types of applications, how they are being used, their relative security risk and if you have been infected by malware.
Customer Success Stories
The Jisc frameworks enable institutions to purchase services and solutions without the need for a procurement exercise. The following case studies explain how institutions are using the Jisc services to protect and prevent against cyber attacks.
Rob Spalding, Head of Infrastructure at Anglia Ruskin University
“Using KHIPU’s vulnerability assessment service enables the University to have a pro-active approach to cyber security. The service, provided by KHIPU Networks via the Jisc framework, has been an immediate success for the University, with a quick return on investment.”
Gerrard Shaw, Network Support Officer at Havering College
"We decided to work with KHIPU Networks via the Jisc framework, as their simulated phishing and awareness offering was exactly what we needed and within our budget. We strongly recommend FE institutions explore the Jisc framework for this service, as we feel social awareness is vital for the on-going prevention of attacks”
Mark McKay, Head of ICT at Guildford College Group
“Using the simulated phishing services, provided by KHIPU Networks, gave us the ability to be one step ahead of attacks and offer an education on good practices to our users which they can use anywhere in life”
Sean Ashford, Network Manager at University of Winchester
“Using KHIPU’s Vulnerability Assessment Service, via the Jisc framework, helped our organisation gain its cyber essentials certification”
Steve Kennett, Director of Security at Jisc
“New security vulnerabilities are being discovered and exploited by cybercriminals daily. For education organisations with large and diverse IT networks, it can be hard enough to simply understand their exposure to known vulnerabilities, let alone try to coordinate patching and testing against them. The Vulnerability Assessment Service is designed to relive this pressure, and prevent outbreaks like WannaCry before they happen.”
Register your interest
- UK: +44(0)345 272 0900
- SA: +27 (041) 393 7608
- Complete the below form
UK Public Sector Purchasing Frameworks
The below Jisc frameworks are available via a direct award to KHIPU:
Zero Vulnerability Infrastructure
Read more about our cyber risk assessment services that address key areas of your environment for maximum protection and prevention against cyber attacks. Free scan available!
Cyber Security Documentary
Weekly 15-minute webinars – Free Scan!
Join our webinars to learn more about our cyber risk assessment and services, and claim your FREE vulnerability scan!
Register Your Interest
I agree to receive communication on newsletters, promotional content, offers and events.
Your information is confidential, KHIPU never sells or shares contact information.