Hurricanes, power-outages, man-made disasters—every organization has to prepare for these but when it comes to emergencies, universities face unique challenges because of the very nature of their structure and communities. Unlike the average office, universities are not enclosed spaces, and many different people—from students, to faculty, to staff, to visitors—are moving in and out of campus on any given day or time. This can make securing the campus and creating a comprehensive university incident response plan difficult.
The Vaporstream Blog
At one-point, email may have been the standard communication tool for businesses because of its convenience, but its limitations have become increasingly clear. It’s time for email to take a backseat. As major news stories in the past few years have indicated - email is often simply not secure. It also is often a medium through which hackers target business—think phishing emails, for example. Finally, it is simply not efficient—people are slow to open their email and slow to respond. Compare this to text messaging (used these days one survey found by over 80% of people for business), which people are much more responsive to.
The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate. White House staffers have reportedly usedthe encryption app Confide to communicate, French president Macron’s inner circle has reliedonTelegram, and former Australia Prime Minister Malcom Turnbull turned to Wickr and Whatsapp. But as government messaging solutions go, such tools are limited, and in most cases not as secure as one might think. They may offer encryption but they fail to secure messages on devices and don’t address critical compliance issues related to government communication.
In emergency situations, speed is key for first responders. Law enforcement agencies need to have the tools in place to be able to communicate and coordinate quickly. Using old and clunky tools—like desktops and laptops—are simply not sufficient for teams to make decisions quickly and securely. And, the traditional radio system can present interoperability problems.
When it comes to cyber security, sometimes the jargon can feel overwhelming. Ransomware, encryption, man-in-the-middle attacks… The Vaporstream blog has covered ransomware and encryption in the past, so today I wanted to focus on what are called the man-in-the middle (MITM) attacks.