Under Attack

Cyber attacks against universities are on the rise, but academic and company labs are fighting back to protect their sensitive data.

Written byLina Genovesi
| 6 min read
Register for free to listen to this article
Listen with Speechify
0:00
6:00

Protecting Against Internet Security Threats in Both Academic and Company Labs

Cyber criminals have a history of targeting government and military systems. But according to a recent article published in the New York Times, “Universities Face a Rising Barrage of Cyber Attacks,” cyber attacks against universities are on the rise and they appear to come mostly from China and, to a lesser extent, from Russia and Vietnam.

Cyber attacks range from low-level attacks to obtain personal information to more complex attacks to obtain sensitive information.

Below is a sampling of the cyber incidents that occurred in the last few months:

• On July 24, 2013, Stanford University announced that its computer system had suffered a security breach and advised its users to change their passwords. The scope of intrusion is not known.

• On July 17, 2013, the personal information of more than 72,000 staff members (past and present) of the University of Delaware in Newark was compromised.

• On January 2013, Mississippi State University was the target of a cyber attack on one of its servers. There was no loss of secure data.

Protecting against cyber attacks

Universities have been forced to tighten the security of their systems while at the same time maintaining the free flow of information. They report the implementation of initiatives to overhaul their network systems, provide training to their employees, and institute policies and procedures to enforce employee accountability—all at significant costs.

Interestingly, universities report that although they may be vulnerable to an attack from the outside, they are also vulnerable to employees providing requested sensitive information without checking the identity of the requester, thus opening the network to a potential hacking attempt. Some universities report dealing with these attempts by increasing the use of technology in addition to monitoring employee e-mails.

To continue reading this article, sign up for FREE to
Lab Manager Logo
Membership is FREE and provides you with instant access to eNewsletters, digital publications, article archives, and more.

About the Author

Related Topics

CURRENT ISSUE - October 2025

Turning Safety Principles Into Daily Practice

Move Beyond Policies to Build a Lab Culture Where Safety is Second Nature

Lab Manager October 2025 Cover Image