Learning From Higher Ed Security Breaches By Ken Lynch - Mar 20, 2019 The higher education is not free from data threats and risks whose primary target is their financial security followed by student retention. Here are the top university data breaches in 2019 that shook the cybersecurity world. Getty Images. Educational institutions have been slow to embrace network security strategies. Check out our recent stories from our blog that our editors selected for you, Secure Your Valuable Data With Pulseway Cloud Backup, How to get acquired or merge with another MSP, Pulseway Launches Remote Control for macOS, Download our mobile app
The report deep dives into the evolution of the threat landscape, who is perpetrating attacks, the top attack types, and assets affected by breaches. And, there is a good chance one of them would be a university. January 17, 2019: Security researcher Troy Hunt discovered a massive database on cloud storage site, MEGA, which contained 773 million email addresses and 22 million unique passwords collected from thousands of different breaches dating back to 2008. For higher education IT leaders, the fundamental tenets of IoT operational assurance include the ability to automate the discovery and classification of IoT devices, identify baseline IoT behavior, detect anomalies, and proactively enforce security policies when an IoT device or a group of them deviate from acceptable behavior. A free lightweight version of the product that lets you monitor and manage 2 systems for free. According to Kim Milford, executive director of the Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), “there’s nothing new” about the most popular attack strategies. By the time you read this article, at least seven victims would have lost their data in some parts of the world. Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. ... ($160,000) as fine for a security breach which compromised personal data of 19500 students. Be on top of everything happening in your infrastructure and neutralize issues before they can cause any real damage â all from a single pane of glass. Access control and data encryption protocols 3. Former students are current power brokers, while some of the parents of the current students wield significant influence. These exchanges were poorly monitored, causing malware. Hackers not only made money, but also got hold of valuable personal data including names, addresses, birthdays, and so forth. Adoption of mobile technologies by colleges and universities has contributed to increased malicious attacks. This research paper provides a literature review of studies on data breaches in higher education and analyzes data on the types of data breaches from 2005-2017. Copy link ... and the Higher Education Policy Institute (Hepi), showed a 100% success rate in getting through the â¦ The information was shared on a popular hacking forum where they could be shared with other cyber thieves. Interestingly, Greenwich is the first university to be fined under the Data Protection Act of 1998. The suit was filed by victims who claimed WSUâs data security was at best âquestionableâ. Campuses are struggling with effective cybersecurity. About 31 percent of data breaches originate internally, according to the paper. To develop best practices capable of meeting cyber threats head-on, IT leaders must first identify common threat vectors: How are malicious attackers gaining network access? According to the statistic provided by Verizonâs annual Data Breach Investigations Report, the frequency of security breaches affecting universities multiplied almost ten times. loss, portable device breach, stationary device breach, or unintended disclosures (Data Breaches n.d.).