<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;">Is your university protected? Iranian hackers attempted to <a href="https://www.forbes.com/sites/geoffwhite/2018/10/29/iranian-hackers-hit-u-k-cybersecurity-universities/#3b858e2631c9" rel="noopener" target="_blank">attack</a> U.K. universities with fake, government-certified cyber security courses. They accessed at least one college account.</p> <!--more--> <p><strong>Main Takeaways:</strong></p> <ul> <li>Universities have unique security challenges from an extremely open environment where people can bring whatever devices they want to being targets of nation-state threats against the infrastructure. Often, they cannot put standard security tools on devices as they may not own or have a right to modify them.</li> <li>Those devices still need to communicate over the network which means they can be protected by firewalls and DNS servers. Even in BYOD environments, systems get their configuration from the network, including the DNS resolvers they will use.</li> <li>By integrating threat intelligence on the network, both in firewalls and in DNS resolvers, you not only fully utilize your existing tools (and don’t have to buy more appliances), you can achieve a measure of protection and control against devices that aren’t otherwise managed.</li> </ul> <p style="text-align: center;"><strong>ThreatSTOP protects universities from these types of attackers. <a href="https://threatstop.com/sites/default/files/UBalt_CaseStudy.pdf" rel="noopener" target="_blank">Here's</a> what University of Baltimore has to say about us.&nbsp;</strong></p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center;">&nbsp; &nbsp; &nbsp; &nbsp;</p></span>