Más contenido relacionado
La actualidad más candente (20)
Similar a Limit Your Vulnerabilities: Assess. Develop. Protect. (20)
Limit Your Vulnerabilities: Assess. Develop. Protect.
- 1. Copyright © 2018 Accenture. All rights reserved.
LIMITYOUR
VULNERABILITIES
Assess. Develop. Protect.
- 2. Copyright © 2018 Accenture. All rights reserved. 02
CYBER
DOESN’T
HAVE TO BE
SCARY
Identifying vulnerabilities allows you
to proactively secure your network.
HERE ARE POTENTIAL
SOLUTIONS FOR CHALLENGES
YOUR NETWORK MAY FACE
Copyright © 2018 Accenture. All rights reserved.
- 3. Copyright © 2018 Accenture. All rights reserved.
OPEN ACCESS
03
Increased number of unmonitored open networks
makes it vulnerable to unauthorised access,
unsafe browsing, and malware infections.
CHALLENGE
TO INFORMATION
SHARING AND NETWORK
POTENTIAL SOLUTIONS
• Centralised network and monitoring
• Implement higher security
management standards
• Place an advanced cyber defense
to current protocols
• Provide enterprise-wide training
and awareness on information
security topics
- 4. Copyright © 2018 Accenture. All rights reserved.
BRING YOUR
OWN DEVICE
04
Users bringing their own devices prevent campus IT teams from
securely monitoring online activities connected to the campus
network. This exposes the institution to more cyber attacks.
CHALLENGE
(BYOD)
POTENTIAL SOLUTIONS
• Identify most valuable assets and standardise
device management system
• Network security and monitoring
Copyright © 2018 Accenture. All rights reserved.
- 5. Copyright © 2018 Accenture. All rights reserved.
DECENTRALISED
05
Without a unified Information Technology (IT) and
Security ecosystem, streamlined practices become
difficult to implement. As a result, distributed data
repositories are scattered throughout the network
making it harder to protect.
CHALLENGE
IT AND SECURITY
PROCEDURES
POTENTIAL SOLUTIONS
• Assess and define enterprise security
policies and standards
• Develop security architecture with flows
• Establish risk levels for applications and
assign security controls
- 6. Copyright © 2018 Accenture. All rights reserved.
UNAVAILABLE RESOURCES
06
Most Higher Ed institutions have limited access to formal Security and Compliance
Governance structure which prevent a standardised set of policies to be formed.
CHALLENGE
FOR IT SECURITY
POTENTIAL SOLUTIONS
• Assess and refine current security governance process
• Invest in educating employees about current policies and
hiring specialised employees
• Examine cloud-based security solutions and managed
security services (MSS)
Copyright © 2018 Accenture. All rights reserved.
- 7. Copyright © 2018 Accenture. All rights reserved.
THINK INNOVATIVELY. ACT QUICKLY.
To discuss the barriers facing your institution, please contact us.
Jonathan Fry
Head of Education, North America
jonathan.a.fry@accenture.com
Lalit Ahluwalia
North America Security Lead
lalit.k.ahluwalia@accenture.com
ABOUT ACCENTURE
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and specialised skills across more than 40 industries and all business functions – underpinned by the world’s largest
delivery network – Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their
stakeholders. With more than 435,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives.
Visit us at www.accenture.com.
Copyright © 2018 Accenture. All rights reserved.
Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Learn more at https://www.accenture.com/digitalstudentau.