Managing Data Exfiltration Risks with Open Access in Higher Ed
When an attacker uses a standard protocol, such as Hypertext Transfer Protocol Secure (HTTPS) or secure copy protocol (SCP), it’s impossible to definitively tell the difference between someone exfiltrating data and someone backing up their laptop’s hard drive. For HTTPS traffic, a common protection in enterprise environments is to enforce the use of proxies,…