
Universities work with a wide range of external partners—edtech vendors, research collaborators, adjunct faculty, guest lecturers, seasonal staff, and government agencies. These relationships help expand learning opportunities and drive research, but they also introduce security risks. When non-employees have access to university systems, weak identity and access management (IAM) practices can create openings for cyberattacks.
Data breaches linked to non-employee identities are becoming more common. Hackers often target external accounts through phishing, credential theft, and ransomware attacks. In some cases, universities unknowingly grant broad or long-term access to temporary users, leaving sensitive information exposed. Student records, faculty research, and administrative data can all be at risk.
This blog looks at the challenges universities face in managing third-party identities, real-world incidents that highlight the risks, and steps institutions can take to improve security.
Universities don’t operate in isolation. They rely on a diverse network of external partners, including edtech vendors, research collaborators, adjunct faculty, and seasonal staff. These individuals and organizations need access to university systems, but they don’t fit neatly into traditional employee categories.
A full-time professor or staff member goes through a structured hiring and onboarding process. Their accounts are created in the university’s system, tied to payroll, and managed through internal HR processes. Non-employees, on the other hand, follow a different path. They may only need access for a semester, a research project, or a short-term collaboration. Some might require deep system privileges, while others just need a login to access a single platform. Because of this inconsistency, universities often struggle to manage their access properly.
External users in higher education fall into several broad categories, each with unique access needs:
Most identity and access management solutions are designed for corporate environments, where employees have clearly defined roles and employment periods. In a business, when someone leaves, HR automatically triggers account deactivation. Universities don’t always have that level of coordination, especially when different departments manage their own non-employee access independently.
Here’s where things often go wrong:
Each unmanaged account represents a security risk. Hackers know that universities have gaps in IAM, and they actively target these weaknesses. A vendor’s compromised credentials can be used to access student records. A research collaborator’s stolen password might expose unpublished data or grant access to proprietary research. An unmonitored adjunct faculty account could be exploited to manipulate student grades.
Higher education operates in a complex, decentralized environment. That makes IAM for non-employees particularly challenging—but also essential. Without clear processes for onboarding, managing, and removing access, universities leave themselves vulnerable to data breaches and compliance failures.
Universities deal with a wide range of security threats, but some of the most damaging breaches happen when non-employee identities and third-party accounts are compromised. The following cases show how weak IAM practices have led to real-world data breaches in higher education.
In July 2023, Michigan State University (MSU) learned that several of its third-party service providers, including the National Student Clearinghouse (NSC) and TIAA, had suffered a data breach. These vendors handled student records, meaning that the breach may have exposed sensitive student information.
This incident highlights a major risk in higher education: When universities rely on external vendors to manage critical data, they also inherit the security vulnerabilities of those vendors. Without strict access controls and continuous monitoring, universities may not even realize a breach has occurred until it’s too late.
IAM failures:
Source: MSU Tech News
In May 2022, the FBI warned U.S. universities that cybercriminals were selling academic credentials on dark web marketplaces. Attackers had stolen login details from researchers, giving them access to sensitive academic and scientific data. Some of this research was tied to government-funded projects, raising concerns about intellectual property theft.
This breach highlights how poorly managed research accounts can become a major security risk. Universities often provide research collaborators with broad access to multiple systems, but without MFA or strict role-based controls, stolen credentials can be used to move laterally across university networks.
IAM failures:
Source: FBI IC3
These breaches are not isolated incidents. They reflect a larger trend: Universities often overlook the security risks tied to non-employee and third-party users. Research collaborators, vendors, and temporary staff may not be permanent employees, but they still need access to sensitive data. When their access is poorly managed, universities become easy targets for cybercriminals.
Universities need a structured approach to managing non-employee access. Instead of relying on manual processes or ad hoc decisions by individual departments, institutions should implement IAM policies that control who gets access, how long they keep it, and what level of oversight is applied.
Below are key strategies universities can use to strengthen security for non-employee identities and protect sensitive research data.
Not every non-employee needs the same level of access. A research collaborator might require entry into secure data environments, while a guest lecturer only needs access to a learning management system. A seasonal IT worker may need administrative rights for a few months, but a contractor working on a single project should have more limited permissions.
Best practices:
Many breaches occur because attackers exploit weak authentication methods. Universities often enforce strong authentication for full-time employees but overlook it for vendors, research partners, and adjunct faculty.
Best practices:
Manual onboarding and offboarding processes create security gaps. Universities need an automated system that grants access when needed and revokes it when the relationship ends.
Best practices:
Granting access is only the first step—monitoring how non-employees use their accounts is just as important. Universities need a system that can detect unusual behavior and flag potential security risks.
Best practices:
Universities must comply with strict regulations governing student and research data. Non-employee identities often fall outside traditional compliance frameworks, creating risks that can lead to legal and financial consequences.
Best practices:
Securing non-employee identities requires a combination of strong access controls, authentication policies, automation, and continuous monitoring. Universities that take a proactive approach can reduce the risk of data breaches, protect research integrity, and maintain compliance with privacy laws.
Universities rely on a diverse network of non-employees—vendors, research collaborators, adjunct faculty, and temporary staff—all of whom require access to university systems. But when IAM practices don’t account for these users, security risks emerge. Data breaches involving non-employee accounts have already exposed student records, stolen research data, and compromised university systems.
To reduce these risks, universities must take a more structured approach to non-employee identity management. This means implementing role-based access, enforcing multi-factor authentication, automating onboarding and offboarding, continuously monitoring access, and ensuring compliance with regulations like FERPA, HIPAA, and GDPR.
A strong IAM strategy isn’t just about security—it’s about protecting students, faculty, and research integrity. By improving how they manage non-employee identities, universities can reduce risk, strengthen compliance, and safeguard their most valuable assets.
Contact us at info@anomalix.com to learn how we can help you secure non-employee identities, enforce strong authentication, and monitor access in real time—all while protecting research data and student records.