Protecting your university from cybercrime
When you protect your students’ data, you’re securing your reputation
Get in touch
Taking cyber security seriously
Our customers rely on our network. So we do everything in our power to ensure it’s safe. We employ over 2,500 security experts from a variety of backgrounds. Some of them may surprise you. From ethical hackers spotting the gaps in security that others might miss, to former police officers with a sixth sense in anticipating cybercrime.
Innovative thinking like this makes sure no stone is left unturned in the battle against threats to security.
Now more than ever, you’re faced with increased regulation and data security needs
Whether it’s helping you build a smarter digital organisation with a focus on profitable growth, or creating a smarter digital institution that builds better facilities and delivers a tech-powered education. Together we share the responsibility of protecting people.
· Our 2,500 security experts can protect your data and your organisation as we do ours
· We’ll secure every part of your network – to and from the campus, between sites and in the cloud
We can give you the right advice and knowledge to keep data safe, no matter what
Let us protect your organisation, as we do ours
Though we can call on cutting-edge technology to achieve cyber security, it’s the people that really make the difference. So now’s an ideal team to meet some of the talented individuals leading our battle against cyber crime.
Working with you to stay ahead of the cybercriminals
Cybercrime is big news - and big business. As cyber attacks become even more sophisticated, it's vital to stay ahead of the criminals. Nobody wants to be the next organisation making headlines for the wrong reasons.
Meet the team making your university safer
Our security experts spend their time keeping your seat of learning safe – so you can concentrate on developing it.
Konstantinos Karagiannis, CTO and blockchain hacker
A familiar face at security and hacking conferences, Konstantinos is the only person at BT who can hack bitcoin. “We like to simulate the exact attacks that the real bad guys out in the wild are doing," Konstantinos tells us. “Hacking is a constant learning experience.” And we use this knowledge to protect you.
Melanie Johnstone, Head of Threat Intelligence
Melanie and her team are responsible for spotting potential threats and finding the source, as well as providing insight into global security incidents to all of our customers. “Cyber security is changing on a daily basis” Melanie confirms. We’re here to give you reassurance you can rely on.
Discover the five stages of cyber security
Protecting your university from the growing threat of cybercrime can be complex and challenging. Our whitepaper – published in the wake of the WannaCry and Petya ransomware attacks – makes it simpler to develop a strategy for keeping your network secure.Download the whitepaper
It’s official – we’re global leaders in security
BT moves from Major Player into the Leaders Category in the IDC MarketScape report: Global Managed Security Services Vendor Assessment.
This report highlights the key strengths of our security portfolio. It calls out our capacity to seamlessly integrate a broad range of managed services with a customer's BT-provided WAN, LAN and data centre solutions.
The report also highlights the fact that “an extensive network gives BT the insight into attacks so that BT can watch, learn, predict, and respond to the latest threats.”
Key points from our digital transformation leaders roundtable
We invited key leaders from BT and the public sector to discuss digital transformation. They talk about the challenges they face, the opportunities available to them, and share some real-world stories describing digital transformation in action.
Is digital transformation the key to success or a security risk too far?
Digital transformation is enabling us to do more, but how are cultural factors affecting security?
Security is changing
How can organisations like yours adapt to the biggest changes that digital transformation can bring?