In recent months we have seen a number of higher education organisations approach us with some fairly specific security criteria. When we have discussed the client's requirements, one topic that appears to be on the agenda more frequently is to stop internal attempts to attack the network.

While in most cases the attempts appear to be more experimental than malicious, it's crucial to shut down this type of behaviour in its infancy, teaching students boundaries of cybersecurity and encouraging experiments to take place in a controlled environment.