{"id":7456,"date":"2022-01-13T18:26:16","date_gmt":"2022-01-14T01:26:16","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7456"},"modified":"2023-04-11T10:14:09","modified_gmt":"2023-04-11T17:14:09","slug":"we-need-cyber-safety-for-our-schools","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/we-need-cyber-safety-for-our-schools\/","title":{"rendered":"We Need Cyber Safety For Our Schools!"},"content":{"rendered":"

Did you know that there are 97,568 public schools in the United States? In 2020, 985 of those schools were hit with ransomware<\/a>. What\u2019s more, there are even more incidents that were not reported!\u00a0<\/strong><\/p>\n

Schools are a particularly vulnerable target for cyber crime, as they house an abundance of sensitive data (e.g., social security numbers, medical files, family information, and academic records). The Multi-State Information Sharing and Analysis Center (MS-ISAC) saw a 19% increase in cyberattacks against K-12 schools between 2019\u20132020, with a projection of an 86% increase for 2022!<\/p>\n

CISA\u2019s New K-12 Study<\/strong><\/p>\n

President Biden signed the bipartisan K-12 Cybersecurity Act into effect on October 8, 2021. This act calls for the Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) to conduct research on the impact of cyberattacks on K\u201312 institutions.<\/p>\n

Is the K-12 Cybersecurity Act the same as CISA’s mandate for all federal agencies to remediate 290+ vulnerabilities<\/a>?\u00a0 No, the mandate and the K-12 Cybersecurity Act are different, but K-12s should be taking this seriously and taking care of those vulnerabilities as well. The K-12 Cybersecurity Act is for CISA<\/a> to study the specific risks impacting K-12 institutions. Based on the study, CISA will provide recommendations for cybersecurity guidelines and create an online training toolkit for K-12 school officials.<\/p>\n

This act marks the first step of the federal government\u2019s involvement in the education system\u2019s cybersecurity issues. It is a great step in the right direction; however, this is just a survey with some planning and optional guidance, and no direct help. Additionally, following the guidelines that CISA provides is on a voluntary basis!<\/p>\n

There is another bipartisan House bill, the Enhancing K-12 Cybersecurity Act<\/a>, which claims that it will promote access to threat information, improve tracking of cyberattacks nationwide, provide grants, and increase the number of cybersecurity experts in schools.<\/p>\n

Schools Have Always Been Underfunded and Under-resourced<\/strong><\/p>\n

Lack of cybersecurity has always been a challenge for the education system. It has come to a point where it can no longer be ignored. Often, schools do not have enough funds to invest in even the most basic of cybersecurity protections.<\/p>\n

Unfortunately, the pandemic has opened up schools to more security threats. With remote schooling options, there has been a significant influx of students and teachers with new devices connecting to networks and applications and this creates an even bigger attack surface<\/a>. Even before the pandemic hit, schools were already struggling to upgrade and maintain their existing technology while their cybersecurity protections could not keep up.<\/p>\n

Ransomware attacks can completely shut down every aspect of a school’s operations. Ransomware gangs will also sell student, teacher, and staff data on the Dark Web to identity thieves. This can massively disrupt the lives of teachers, parents, and students alike, which means that there is a lot of pressure on school leaders to pay the ransom quickly to get their systems back up and running.<\/p>\n

Paying Ransom or Remediation? Both are Costly!<\/strong><\/p>\n

This pressure has caused some schools to have paid the ransom, while others have paid for remediation. Ransom requests can range from $5,000, all the way up to $40 million<\/a>! The downtime from ransomed systems and data recovery has cost educational institutions billions of dollars. Some schools have even been hit with ransomware more than once.<\/p>\n

For instance, the Clark County School District in Nevada was hit with ransomware in 2020. As the fifth-largest school district in the U.S., the ransom affected 328,991 students from 374 schools<\/a>. The county did not pay the ransom and the hackers released the student data online.<\/p>\n

The K-12 Cybersecurity Resource Center<\/a> reported more than 400 publicly disclosed cyberattacks on U.S. schools, while Comparitech\u2019s research showed there were\u00a077 individual ransomware attacks that affected 1,740 plus schools impacting a potential 1.36 million students<\/a>.<\/p>\n

Hackers seek out institutions such as healthcare and local governments because they are already strained and vulnerable.<\/p>\n

What Can a School do to Protect Itself?\u00a0\u00a0<\/strong><\/p>\n

The K-12 Cybersecurity Act is a good place to start. The bill is establishing a research program to help schools identify their cybersecurity vulnerabilities and improve their cybersecurity defenses. However, the study will not be completed until mid-to-late 2022.<\/p>\n

So, what can schools do to protect themselves in the meantime? Lots!<\/p>\n

Schools need to start Security Awareness Training. Security is everyone\u2019s job\u2014both the staff and students\u2014and, a little bit of awareness goes a long way. Best practices include not sharing passwords, avoiding clicking on bad links, and ensuring that everyone stays updated and learns how to be more secure. Amazon offers some free cybersecurity awareness training<\/a>. There are also training modules from the Family Educational Rights and Privacy Act (FERPA)<\/a>.<\/p>\n

Vulnerability management can rapidly and affordably identify where schools have weaknesses. Discovering what systems are publicly accessible and what threats are visible to a hacker is a great first step. Assessing vulnerabilities inside a school network is also critical to round out the assessment. Being able to intelligently prioritize which systems to patch and remediate can also help schools address the most critical needs first. And lastly, this should not be a one-time exercise; this should be repeated quarterly, if not monthly!<\/p>\n

Penetration testing (or pentesting) your network and your applications will help standardize your security program.\u00a0 Pentesting helps test and prove out how your systems can be exploited and takes your vulnerability scanning to the next level.\u00a0 Schools should prioritize pentesting their networks and most critical applications at least once a year or whenever a major change takes place.<\/p>\n

Schools should also ensure they have solid Business Continuity and Disaster Recovery (BC\/DR) plans.\u00a0 These plans include what to do if or when an incident occurs (it is easier to think about your process before an incident).\u00a0 One of the key strategies for ransomware recovery is having good backups. Although this does not sound very exciting, having a solid backup program can allow you to easily recover and bypass any ransomware issues.<\/p>\n

Our schools need all the help they can get and our students and teachers deserve to not be interrupted by ransomware. Cybersecurity does not have to be hard, especially as there are more resources available today to help than ever before.<\/p>\n

To know more about Securin\u2019s Vulnerability Management as a Service (VMaaS), please click here.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity is a priority in education due to the lack of resources and continual ransomware attacks. CISA\u2019s new K-12 Cybersecurity Act will research and develop tools to help schools become more secure against cyberattacks.<\/p>\n","protected":false},"author":17,"featured_media":7457,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[80,127],"tags":[261,263,524,91,523],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7456"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/comments?post=7456"}],"version-history":[{"count":7,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7456\/revisions"}],"predecessor-version":[{"id":17538,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7456\/revisions\/17538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7457"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/categories?post=7456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/tags?post=7456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}