Cyber Liability in Education
October 27, 2016 By Christopher George cyber liability, cyber responsibility, cybersecurity, Education
Smarter, stealthier, and more subversive and sophisticated than ever. The cyber threat landscape has overwhelmingly grown, not only in the size and type of organizations and information at risk, but in its attack processes and those who carry them out wittingly or unwittingly. As organizations increasingly leverage new technologies like mobile, cloud, and the Internet of Things, understanding the roles students, employees, and third-party vendors play in the ever-evolving threat landscape is essential in protecting your data from cyber attacks.
Technology has become such a part of our lives that many of our young students do not remember a world without it. Today, there are a plethora of free tools (spyware, malware, ransomware) readily available online that any student can use to infiltrate a school’s network, gaining access to everything from logins and passwords to student and staff records, grades, health records and more.
For employees and staff, it’s not so cut and dried. Network security is at constant risk of threats from social engineering and phishing. In the simple act of doing one’s job, an employee or staff member can inadvertently disclose sensitive information or click on a link in what appears to be a valid email allowing an attack on the entire network and all its attached devices.
Over sharing of internal information and network permissions with third-party vendors are another area of particular threat. There are countless examples of vendor laptops being stolen that contain sensitive information such as special education student records, health records, and personal employee records. Other third parties, such as industrial vendors who control HVAC systems in schools and other organizations also pose threats from both internal and external actors.
The financial impacts of security breaches extend far beyond the costs to an organization, but also to its students, families, customers, and clients. How much are these breaches going to cost? $300 per compromised record is the current estimate, along with other factors such as regulatory compliance and increased penalties (PCI, HIPAA, SSAE16 etc.), and jury awards.
What do you need to know and what can you do? We’ve put together a list of informative resources to get you started on things you can do internally in your organization to improve cybersecurity.
8 Resources to Improve Your Internal Cybersecurity
- Privacy Technical Assistance, Staff education, and Notification Requirements
- Employee Security Awareness Training Education
- Data Breach Response Checklist
- State Cybersecurity Breach Notification Laws and Requirements
- Business Continuity and IT Disaster Planning
- Cybersecurity and Defense planning
- Data Breach Examples, Blogs, and Information
- Cybersecurity Awareness and Tips
Adding to the complexity of this ever-changing threat landscape, Infosec and cyber defense skill set shortages along with over-dependence on IT departments for compliance and oversight makes security challenges a daunting task. It is estimated that by the year 2020, there will be a shortfall of 1.5 million cyber security professionals.
Protelligent’s Premonition™ services focus on intelligence driven security strategies, effective resource utilization, staff training, and reduced risk footprint that are right for your organization. Contact us today toll-free at (855) PRO-TELL or visit our Premonition™ Security Suite page to learn more.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)