Day: April 22, 2018

IT Security

IT Security in higher education – spotting the attacker

It’s already a given that spotting an attacker is difficult in IT Security – they use compromised credentials to access any and all data available to that account. This means that the attacker is simply accessing whatever data the user was already given access to. So, how are you supposed to spot inappropriate access when