Why School Cyber Hygiene Is Critical in The Education Industry

The education sector faces evolving cyber threats: insider errors, ransomware attacks, and vendor vulnerabilities.

June 19, 2023

School Cyber Hygiene

Schools face evolving cyber threats in an increasingly digital educational landscape. Insider errors, ransomware attacks, and vendor vulnerabilities require a strong focus on cyber hygiene and awareness to safeguard sensitive data, says Charlie Sander, CEO of ManagedMethods.

Although we talk about the seriousness of the cybersecurity threat in education a lot, it is worth repeating this alarming Microsoft statistic 6,110,425 (80.1% of the global total) Opens a new window enterprise malware encounters in the last 30 days were from the education sector.

Due to the lack of effective cybersecurity procedures in schools and the high value of the data that hackers can obtain on the black market, hackers frequently target educational institutions. For instance, files including the names, addresses, social security numbers, and other personally identifiable information of students may be sold to exploitative bidders who may use the information to set up fraudulent loans.

While the remote learning movement required by the COVID-19 pandemic has brought about many positive changes, such as increased flexibility and varied learning access, it has also accelerated cybersecurity vulnerabilities. At the pandemic’s start, there was an onslaught of invasions through video conferencing hacks, malware, and social media attacks. And while school administrators have had to adapt to this new environment quickly, many districts are still vulnerable.

As schools continue to expand their use of technology and access to various devices, they need to be more aware of cyber hygiene than ever before. Let’s dive into the new threats schools face before analyzing how they can cope.

The Threats and How They’ve Evolved

One of the main threats that school districts face is insider error or negligence. This results from someone with legitimate access accidentally sharing sensitive information publicly or to users that should not have access.

A clear example of this comes from Google Drive. Many people will select the “anyone with the link” option when granting access to colleagues without batting an eyelid. However, this is highly problematic because it allows hackers to find their way into the document. Hackers can use “URL guessing” to find publicly shared Google Drive links by guessing possible URLs or using “brute-force” tools to generate random URLs. For districts that don’t have some kind of automated policy set up to monitor potential unwanted access, there could be tons of confidential PII and financial information freely accessible on the internet in these documents.

Ransomware receives a lot of coverage in the media, and rightly so. The education sector has recently become a primary target for hackers as they are considered soft targets with valuable information and considerable pressure to restore their systems. Ransomware attacks on education have dramatically increased by 56% in K-12, and 64% in higher education were hit in 2021Opens a new window , up from 44% in education the previous year. Additionally, schools have to fork out a huge amount of recovery costs. K-12 spent a whopping $1.58M, and higher education spent $1.42M to rectify ransomware attacks.

Ransomware has also become more sophisticated. Ransomware is used to encrypt data so it can’t be accessed, but it doesn’t leave the information system where it was located. Once the ransom was paid, or the backups restored, etc., districts didn’t necessarily have to be concerned that the criminals had copies of the data. However, now hackers can extract data from a system before encrypting it themselves, allowing them to threaten the victims further and sell copies on the dark web. 

Lastly, there is vendor risk management. This threat has increased as a result of more third-party tools in schools for a variety of purposes. Many of these tools will connect to the school’s network and leave a weak point in the cybersecurity infrastructure. Open authority (Oauth) vulnerabilities can crop up due to these weaknesses. And this evolution has come about from students and staff members blindly accepting app permissions while downloading a new application.

See More: Why Should Developing Vendor Cybersecurity Be a Top Priority

Good Cyber Hygiene in a Remote-learning World

Whether we like it or not, remote learning is here to stay. While schools moving to cloud providers such as Google Workspace, Microsoft 365, etc., brings many benefits, many districts didn’t transition with a security-first approach.

There are countless articles out there calling for the need for sophisticated firewalls and content filtering. While that is true, the real problem lies in the remote access that students and teachers use now, which renders these network-based security measures useless. Schools must focus more on zero-trust cybersecurity, which requires proper cloud security access configurations. It also requires you to continuously monitor account behavior, such as login access from abnormal locations at abnormal times. 

See More: Remote Corporate Learning: 5 Best Practices for a Fast Transition

Cybercriminals can attack district information systems in new ways that many IT teams don’t even realize are a problem. At ManagedMethods, I can’t tell you how many times we’ve seen a handful of compromised user accounts in a district’s Google account that they had no idea was even possible or even exactly how that might impact security. In many ways, it’s unfortunate that ransomware gets so much attention because it is usually the nail in the coffin, where there are usually so many prior warning signs before an attack that most people never see or don’t even realize after the attack.

Schools must educate pupils on the dangers of clicking on suspicious links, downloading unknown software, and sharing personal information with unfamiliar sources from their home PCs. Students should be taught to be wary of suspicious emails and to only open messages from trusted senders. Additionally, they should be advised never to open attachments from unknown sources and to be vigilant when browsing the web to avoid malicious sites.

Furthermore, it’s crucial to safeguard online accounts with robust passwords. Despite its obvious importance, two factor-authentication is something that is often overlooked. Unfortunately, many individuals still use the same password for multiple accounts, putting themselves at risk of cyber attacks. If hackers access one password, they can potentially infiltrate all linked accounts, leading to a catastrophic breach of personal information.

How can enterprises safeguard sensitive data and enhance cyber hygiene to ensure a secure learning environment? Share your thoughts with us on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window . We’d love to hear from you!

Image Source: Shutterstock

MORE CYBER HYGIENE

Charlie Sander
Charlie Sander is CEO of ManagedMethods, a Boulder, Colorado-based data security and student safety platform for K-12 schools. With more than three decades of experience in the IT industry, Charlie has been an executive at some of the fastest-growing companies in business. He holds 10 patents and graduated from the Cockrell School of Engineering at the University of Texas at Austin with a BSEE degree.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.