SlideShare a Scribd company logo
1 of 10
Download to read offline
Potential vulnerabilities to
e-learning - Mimecast
Phillip Hay, Threat intelligence analyst - Mimecast
Phillip Hay
Threat Intelligence Analyst - Mimecast
Scale of Detected Attacks in Last Month
Detected Attacks on Higher Education
657.71 Detections
6.88 per user
Peak - Saturday 4TH (50623)
Detected Attacks on Government Public Admin
609.44K Detections
4.02 per user
Peak – Thursday 9 Apr (22667)
Detected Attacks on Higher Education
Detected Attacks in the last 12 Months
3.95M Detections
41.32 per user
Dec 19
COVID-19
Full Time Education at Home
• A change in “traditional ways” of learning for the foreseeable future.
• A new style of school community began as students registered online and in school forums
• New set of opportunities for criminals
What we see:
• Education sector accounts for 2.8% of observed attacks Mar - Apr 2020 ( 87% Spam)
• Increased Phishing Attacks – Data Over Sharing
• Threat Actor Reconnaissance
• Opportunist Attacks
Considerations:
• What access to technology is required?
• What software and features are required?
• Privacy and terms of agreement?
• Who will ensure security and technical support?
• Only use approved software and systems
• How will you communicate with students?
Recommendations for e-Learning
• Maintain online etiquette following school or college policies.
• If possible, avoid using social media platforms.
• Staff and students should understand the importance of a strong password
• Only use approved school software with school administered accounts.
• Double-check URLs and Links – If suspicious, do not click!
• Students may be exposed to email for the first time, ensure they know how to use it safely.
• Personal accounts should not be used - Potential compromise and abuse.
• Ensure students and staff understand what being safe online means, talk about it.
• Cyber-attacks are highly likely to continue targeting companies,
governments and individuals with:
• Increasingly sophisticated tactics and techniques
• Using progressively more complex social engineering
techniques
• The most vulnerable members of our society will remain
particularly susceptible to attack
• Increased number of people working and schooling from home
increases the attack surface.
• Increased amount of electronic communications, spam and
phishing attempts
Future Concerns
Questions?
Thank you
Phillip Hay
Threat intelligence analyst -
Mimecast
customerservices@jisc.ac.uk
jisc.ac.uk

More Related Content

What's hot

BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
emilyensign
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
emilyensign
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
peav1n0
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
cinkay
 

What's hot (20)

BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Success
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Secrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety CurriculumSecrets to an Effective Online Safety Curriculum
Secrets to an Effective Online Safety Curriculum
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
History of Technology
History of TechnologyHistory of Technology
History of Technology
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
 
Implementing e-inclusion in Flanders
Implementing e-inclusion in FlandersImplementing e-inclusion in Flanders
Implementing e-inclusion in Flanders
 

Similar to Potential vulnerabilities to e-learning - Mimecast

The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Tracker
dealy14
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 

Similar to Potential vulnerabilities to e-learning - Mimecast (20)

Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Tracker
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Digital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabusDigital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabus
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Cybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and ManagersCybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and Managers
 
Steve warburton
Steve warburtonSteve warburton
Steve warburton
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
 

More from Jisc

More from Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Potential vulnerabilities to e-learning - Mimecast

  • 1. Potential vulnerabilities to e-learning - Mimecast Phillip Hay, Threat intelligence analyst - Mimecast
  • 2. Phillip Hay Threat Intelligence Analyst - Mimecast
  • 3.
  • 4. Scale of Detected Attacks in Last Month Detected Attacks on Higher Education 657.71 Detections 6.88 per user Peak - Saturday 4TH (50623) Detected Attacks on Government Public Admin 609.44K Detections 4.02 per user Peak – Thursday 9 Apr (22667)
  • 5. Detected Attacks on Higher Education Detected Attacks in the last 12 Months 3.95M Detections 41.32 per user Dec 19 COVID-19
  • 6. Full Time Education at Home • A change in “traditional ways” of learning for the foreseeable future. • A new style of school community began as students registered online and in school forums • New set of opportunities for criminals What we see: • Education sector accounts for 2.8% of observed attacks Mar - Apr 2020 ( 87% Spam) • Increased Phishing Attacks – Data Over Sharing • Threat Actor Reconnaissance • Opportunist Attacks Considerations: • What access to technology is required? • What software and features are required? • Privacy and terms of agreement? • Who will ensure security and technical support? • Only use approved software and systems • How will you communicate with students?
  • 7. Recommendations for e-Learning • Maintain online etiquette following school or college policies. • If possible, avoid using social media platforms. • Staff and students should understand the importance of a strong password • Only use approved school software with school administered accounts. • Double-check URLs and Links – If suspicious, do not click! • Students may be exposed to email for the first time, ensure they know how to use it safely. • Personal accounts should not be used - Potential compromise and abuse. • Ensure students and staff understand what being safe online means, talk about it.
  • 8. • Cyber-attacks are highly likely to continue targeting companies, governments and individuals with: • Increasingly sophisticated tactics and techniques • Using progressively more complex social engineering techniques • The most vulnerable members of our society will remain particularly susceptible to attack • Increased number of people working and schooling from home increases the attack surface. • Increased amount of electronic communications, spam and phishing attempts Future Concerns
  • 10. Thank you Phillip Hay Threat intelligence analyst - Mimecast customerservices@jisc.ac.uk jisc.ac.uk