Image Source: Pixabay
Microsoft Word users found the scariest thing hidden in their software, an authentic-looking word documents booby-trapped with malicious code, in April. There’s a harmful code infiltrating the system once the user open the rich text format file. Students in college are the target where hackers steal their vulnerable private information.
A month later, online criminals used the tool, WannaCry, to morph the ransomware into malware juggernaut. They hack the private information at ransom from Microsoft users for Bitcoins.
To attack and avoid hackers, higher education IT departments must provide a steady stream of advice on how to avoid vulnerabilities and how to proceed if compromised, says Ganesan Ravishanker, CIO and associate dean at Wellesley College in Massachusetts.
Colleges can provide training and videos that educate users about the anatomy of phishing emails. “We strongly advise our community not to open unsolicited documents and not to click links if the sender isn’t verified” said by CISO Thomas P. Murphy at Northwestern University.
Colleges can also installs anti-virus/anti-malware software on faculty, staff, and students computers to block and filter unsecure website. “ You don’t want to push a patch during a lecture or exam or during some critical point of research computation,” said by Murphy.
There are risks in shared computers or machines that aren’t booted up regularly. Security software won’t download automatically if the machines are at sleep or down.
For more information, visit the main article on EdTech