student

School Districts: Data = Dollars

School Districts: Data = Dollars

Hackers are focusing their attention on educational institutions more than ever before. This might sound like a waste of time, right? Why would someone want to hack a school district when there are other options that seem more logical, for example, financial institutions and banking apps? However, looking at this from a hacker’s perspective, it will begin to make much more sense. There are many reasons a hacker would target a school district, with the primary being something they love the most: DATA.

First, let’s begin with employees since hacking their information seems very useful. The vast amount of demographic and administrative data of employees the school or district collects is a treat for hackers. This can be personal information, such as their names, addresses, dates of birth, and photos, as well as more sensitive information like their Social Security numbers, banking information, education credentials, and work records.

Moving ahead to the next set of targets, we come to the students. Schools often retain a lot of information about their students, including complete names, home addresses, birthdays, health records, and the PII associated with the guardians of the students. This information is enough for financial fraud. Student personal information is valuable since criminals can use it to obtain credit. If they succeed in identity theft, they can create several accounts using the student’s credentials, thereby ruining the student’s credit. What makes this worse is how long it can take for someone to realize it has happened. It is only when they try to build credit or even apply for a college loan at age 18, do they uncover that they are a victim.

For instance, hackers released information about students and employees after the attack on a Public School in Ohio. The breach contained information like social security numbers, home addresses, and more basic data like names, dates of birth, and gender. Surprisingly, a few months later, a father noticed someone had started attempting to apply for a credit card and a vehicle loan in the name of his elementary school-aged child. Cases like this show what attracts hackers to the vast data available in school districts, highlighting the need to improve their cybersecurity.

People have historically chosen to live in a particular neighborhood based on the reputation of the public school. Maybe it is the reputation for educational excellence, a renowned sports program, or historical significance that drove a student’s decision to enroll. But in the future, it should not come as a surprise if decisions become rooted in how confident the student is regarding the security of their personal information. Additionally, how will states react to cybersecurity spending when the state-aided districts require incident response and reactive emergency cybersecurity spending.

Posted in

Zelvin Security

Protecting Your Digital Smile: The Importance of Continuous Security Testing

Continuous security testing is an essential component of an effective security strategy. In today’s digital landscape, organizations face a constant stream of potential threats and vulnerabilities that can put sensitive data and critical systems at risk. Without continuous security testing,…

READ MORE

10 Tips to Secure M365

M365 has many built in security features. Are you using them to the fullest extent? Join this webinar and learn how to Using the mindset of a malicious hacker, the Zelvin Security team identified a list of security tips CISOs…

READ MORE

School Districts: Data = Dollars

student

Hackers are focusing their attention on educational institutions more than ever before. This might sound like a waste of time, right? Why would someone want to hack a school district when there are other options that seem more logical, for…

READ MORE

Healthcare – A Top Target

md

It shouldn’t come as a surprise that the healthcare sector is one of the hackers’ favorite targets. And why wouldn’t it be? Patient data and hospital systems are highly valuable, making them perfect for demanding ransom. Any disruption in the…

READ MORE

ROI of Penetration Testing

You may already have a group of Information Technology professionals, and spend money on security tools to alert, detect, and quarantine security anomalies, so why would you even need to spend money on a penetration test? Well, just like any…

READ MORE