In a cyber security survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list. Credit: Robbie Shade In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report released today, SecurityScorecard analyzed the educational institutions based on web application security, network security, endpoint security, IP reputation, patching, and other security indicators.SecurityScorecard’s chief research officer Alex Heid said they have a feeling that MIT’s low scores were due in part to its cybersecurity research efforts.“They do their own malware research,” he said. “They run honeypots. They’re running TOR exit nodes.” But that’s only part of the story, he added.“When we dug in, we found that there’s a lot of exposed passwords, old legacy systems, and a bunch of administrative subdomains that seem to have been forgotten about,” he said. Other problems included instances of the old Conficker worm, vulnerable ports, and old services still up and running which shouldn’t be running anymore.It’s common at colleges for students and faculty to move on and forget to shut down old projects, Heid said.MIT received high marks in web application security, DNS health, and application security.MIT’s failing score for password exposure did not actually count towards MIT’s low overall score, he added, because often passwords are exposed when students and staff reuse credentials on other sites which are breached.Organizations aren’t penalized for factors out of their control, he said.But all 10 of the lowest-scoring institutions in the report received a failing grade for exposed passwords, Heid said. “When we look at the actual sources of breaches for universities, a lot of the breach information was from the university itself,” he added.The school with the highest scores? Merced Community College in Merced, California.Educational institutions tend to worse on security metrics than similar-sized organizations in other sectors, said Heid.They often use students to run some of their infrastructure, he said. “And mistakes are encouraged because that’s how you learn.” In addition, companies in finance, insurance, or defense are likely to have professional security teams in place to make sure that problems are few, and are fixed quickly when they arise.For example, it takes educational institutions an average of 28 days to patch critical vulnerabilties, said Heid.“That’s a long time compared to other large institutions,” he said.In addition, universities have traditionally been a favorite stomping ground for hackers, he said. “That still holds true today.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe