Download PDF version Contact company

British universities are cited as some of the best in the world; working on cutting-edge and revolutionary research.

Physical security measures

The Director General of MI5 and senior politicians warned last week these institutions are being targeted for their intellectual property (IP) by hostile states and spies and as a result, this is a threat to national security.

In the face of this, universities must work at speed to increase their physical security measures and keep their academia and research safe, while balancing the need for an open exchange of ideas that is vital to academic progress.

Open sharing and collaboration

Noah Price, G4S Academy International Director, said, “Threats against universities are on the increase and are expected to rise further."

"Hostile states target universities because unlike government agencies or security services, these institutions prioritize the open sharing and collaboration of research, ideas, and education, which can make them more vulnerable to cyber-attacks and espionage."

Multi-layered security

Intellectual property theft committed by an external threat actor is expected to increase by 30% in the UK

"Universities working on cutting-edge research need to implement targeted multi-layered security as a matter of urgency to protect sensitive research.”

Intellectual property theft committed by an external threat actor is expected to increase by 30% in the UK in the next year, according to G4S’s first-ever World Security Report.

Insider threats

A preventative measure being considered by the UK government is for academics involved in critical scientific research at British universities to undergo vetting by security services.

With internal threats expected to increase next year according to 94% of UK Chief Security Officers, vetting of university staff and regular re-vetting are actions G4S supports.

Unauthorized access

Leaking of sensitive information, unauthorized access to company data or networks, and intellectual property theft are all expected by almost a third of respondents to our survey,” Price said.

Vetting and regular re-vetting are a really good physical security measure to detect those trying to infiltrate an organization, or to see if anyone has been turned.”

What physical security measures can be taken?

AI surveillance systems may also be another; allowing security officers to monitor the movements

Universities must implement a robust security operation preventing both physical and cyber threats. Implementing two-factor authentication on research devices, as well as passcode or biometric access controls are just two examples.

AI surveillance systems may also be another; allowing security officers to monitor the movements of individuals ethically.

Documents access

Institutions should also monitor who is accessing certain documents on their devices. If there is no need for an individual to be reading a piece of research this could be a sign they are attempting to access confidential information and may be an insider.

Price said, “While we all want universities to share academia, knowledge, and expertise, they must do so within a secure environment that protects IP from being stolen and also protects our national security. Implementing and maintaining a robust security operation is the best way to do this.”

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...