Page 56 - Cyber Warnings
P. 56
password. This type of security analyses the time, the location, the device, the IP address and
other contextual factors surrounding a login.
Based on that information, IT administrators can set rules that restrict logins to only those that
don’t look suspicious.
For example, if the login details of a student at Harvard falls into the hands of an attacker based
in China, the system can deny access because the login attempt is happening outside of
Massachusetts — even if the attacker is using the right username and password.
This kind of security protects students against the consequences of phishing attacks and halts
dangerous concurrent login practices, all without hindering the student or slowing them down.
It stops attackers from gaining entry and stealing valuable data or uploading ransomware. It
provides the same strength security as multi-factor authentication without any of the hassle
because the security simply acts in the background.
It protects against lax behaviour and gives the university’s IT team peace of mind that those
logging in to university systems are exactly who they say they are. It’s a win-win situation for
both students and IT teams.
Context-aware security is therefore the future of protecting university IT. It’s the form of
protection that students want, and IT teams need.
About the Author
François Amigorena is the founder and CEO of IS Decisions, and an expert
commentator on insider threat issues.
IS Decisions is a provider of infrastructure and security management software
solutions for Microsoft Windows and Active Directory. The company offers
solutions for user-access control, file auditing, server and desktop reporting, and remote
installations.
Its customers include the FBI, the US Air Force, the United Nations and Barclays — each of
which rely on IS Decisions to prevent security breaches; ensure compliance with major
regulations; such as SOX and FISMA; quickly respond to IT emergencies; and save time and
money for the IT department.
56 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide