Connect with us

Cybersecurity

Justin Reilly: Rising Ransomware Threats on Schools Require Better Approach to Cybersecurity

Ransomeware attacks are a costly lesson for educators.

Published

on

The author of this Expert Opinion is Justin Reilly, CEO of Impero Software

Since the advent of the pandemic, education has been in a state of vulnerable flux. The rapid embrace of technology, sparked by the need to introduce remote learning, has given many educators whiplash. They need time to normalize, but recent trends threaten their ability to do so.

Against the backdrop of technological chaos, opportunistic hackers have been targeting schools with heightened fervor, causing harmful delays and disruptions on both a systemic and financial level. It’s time for schools to start getting proactive about cybersecurity, or they risk paying a hefty tuition to learn why they should have acted sooner.

Education technology use is surging across the nation. A recent study showed ed-tech up 52 percent over pre-pandemic levels, with U.S. school districts using nearly 1,500 different digital tools on average each month. While these digital tools possess the power to ultimately streamline and transform classroom management for the better, teachers are still feeling overwhelmed by the number of technology solutions they’re being asked to implement.

This issue is being exacerbated by many tech-resistant districts and teachers being forced to catch up all at once. When the pandemic hit, using devices and technology in the classroom was no longer an option – learning quickly needed to be online and accessible. By now, the dam has fully broken on tech adoption and we’re only likely to see these trends accelerate. Of course, as other sectors have seen firsthand over the last two years, these unchecked developments often cast unsavory shadows.

An appealing target for hackers

School districts were already an appealing target for hackers ahead of the pandemic, but the rapid adoption of technology – often outstripping security measures equal to these digital strides – has effectively chummed the waters for malicious elements looking for a “soft” target.

Cyberattacks against school districts went up by 18 percent in 2020, the height of the pandemic. The trend has continued since and isn’t expected to slow down in 2022. Among attacks against school districts, ransomware – an attack that locks users out of files on their own systems and then demands ransom money to return their rightful access – is by far the most common variety.

Just a few weeks into 2022, there were already multiple major headlines involving ransomware targeting school districts. The biggest story was the hacking of education website service provider FinalSite, which shut down the websites of 5,000 schools and colleges. Another story involved the cancellation of classes for 75,000 students after the Albuquerque Public Schools district fell victim to a ransomware attack it had been fending off for several weeks.

Yet another case, also in New Mexico, affected the town of Truth & Consequences. The town suffered a cyberattack just after Christmas and, as of mid-January, had still not regained control of its computer systems.

There’s no time left for district leaders to drag their feet on cybersecurity. It can be tough, especially given budget challenges, but the gap between digital advancement and lacking cybersecurity presents too great of a risk for schools.

Make cybersecurity a priority in hiring 

So what can school districts do to prepare? The first step is to make cybersecurity a proper priority – and that includes budgeting and hiring. Many schools still don’t have dedicated cybersecurity officers, instead relying on – in many cases at best – a CIO who happens to be tech-savvy.

This is starting to turn around in light of recent events, with more and more schools hiring chief cybersecurity officers and point-persons. Keeping up with this trend will be critical for setting a strong foundation.

Budgeting will always be a challenge, of course, seeing as many school districts still don’t have any budget at all dedicated to cybersecurity. This needs to change, but some schools have started getting creative on this front in the meantime. One possibility is to fold cybersecurity efforts into operating budgets. Another timely approach is to capitalize on new and improved “cyber grants” being offered by federal and local governments to meet this increasing need.

The most important thing is simply not to be ad hoc about cybersecurity. School districts can proactively gather data to find out where their needs are, what the wants are from teachers, and how they can properly address them. It’s far better to start gathering this data early rather than wait until it’s too late.

Consider this: schools can either make the investment now or pay much more a short way down the road. Should a school or district become the victim of ransomware, they’ll have to pay both to resolve the immediate crisis and for cybersecurity upgrades, all of which will have been unbudgeted and leave them reeling long after the attack. The norms of education are changing, and priorities need to change with them.

Justin Reilly is the CEO of Impero Software, which offers a virtual private network solution for schools and also serves more than half of the Fortune 100. This Expert Opinion is exclusive to Broadband Breakfast.

Broadband Breakfast accepts commentary from informed observers of the broadband scene. Please send pieces to commentary@breakfast.media. The views reflected in Expert Opinion pieces do not necessarily reflect the views of Broadband Breakfast and Breakfast Media LLC.

Broadband Breakfast is a decade-old news organization based in Washington that is building a community of interest around broadband policy and internet technology, with a particular focus on better broadband infrastructure, the politics of privacy and the regulation of social media. Learn more about Broadband Breakfast.

Cybersecurity

Large Telecoms Pitch Strike Force for Internet Traffic Security Over Global Gateway

Verizon, AT&T and Lumen warned about prescriptive rules that could diminish security.

Published

on

WASHINGTON, February 23, 2023 – Verizon, AT&T and Lumen Technologies have proposed that the Federal Communications Commission adopt and lead a strike force consisting of various industry, government and international participants to come up with policy mechanisms to secure internet traffic over the global gateway.

The proposals are particular to the border gateway protocol, which is how global traffic is routed. The problem is that there are no security features to ensure trust of the information being routed, according to the FCC, which opened a proceeding on the matter on February 28 last year asking for commentary on what to do about the issue. The concern is that without security measures, bad network actors can redirect traffic to itself instead of the intended recipient, which exposes Americans to the theft of identity, extortion, financial transactions, and state spying, the commission noted.

In the letter last week, the three telecommunications companies proposed that secure internet traffic routing practices over the border gateway protocol first focus on critical infrastructure entities in the United States and its allies to allow these telecommunications companies to protect the traffic routes via filtering.

The filtering would involve registering traffic origins and identifying where to filter traffic along the route, including at interconnection peering points and customer routers. The proposed strike force would involve Big Tech companies and cloud platforms, which the FCC asked if it should include in its original proceeding document, as they have networking equipment and BGP routers. The internet service providers, who have their own filtering practices, also floated the possibility of the Cybersecurity and Infrastructure Security Agency requiring other agencies to provide that information.

The proposal also includes “collaborative assurances” in which the ISPs would provide confidential technical briefings about the practices.

But they advise against the FCC making prescriptive rules about such practices, noting that different ISPs have different approaches by design, and that any onerous approach could jeopardize security, not bolster it.

Questions about FCC’s jurisdiction over a fundamentally global internet routing system

The trio also questioned the jurisdiction of the commission on the routing ecosystem, which is fundamentally global.

“Asserting prescriptive regulatory control over internet protocols could have cascading effects, prompting international regulators – and authoritarian regimes in general – to seek greater internet control at the global level through” the United Nation’s telecommunications regulatory, the International Telecommunication Union.

“This would create barriers to U.S. leadership in the global digital economy and U.S. national security and is directly contrary to core interests of the United States and our free market democratic allies,” they added.

The FCC’s notice came just days after Russia’s invasion of Ukraine, which resulted in reports of increased cyberattacks from the warring regions. In fact, the FCC accused Russian network operators of inexplicably routing traffic through its country, including from traffic from Google, Facebook, Apple, Microsoft and major credit card companies MasterCard and Visa.

It also came before a law was passed that requires critical infrastructure companies to report to the federal government within a certain timeframe when they have experienced a hack or breach, as the country grapples with a number of high-profile attacks since the pandemic began.

The FCC has targeted national security threats by halting license authorizations to Chinese firms and putting on a blacklist a number of companies whose equipment American telecommunications companies are expected to remove from their networks.

Continue Reading

Cybersecurity

Smaller Companies Facing Cybersecurity Insurance Headwinds: Equifax Executive

Cost of insurance for cybersecurity could be a problem for smaller companies.

Published

on

By

WASHINGTON, February 15, 2023 – Smaller companies may face increasing cybersecurity insurance costs as the market evolves, warned an executive at credit bureau company Equifax.

Cybersecurity insurance will be extraordinarily important for small-to-medium-sized businesses, said Jamil Farshchi, executive vice president and chief information security officer. But premium cybersecurity insurance coverage has increased in recent years, with many small-to-medium-sized businesses relying on that cybersecurity insurance to keep them safe.

“These are small businesses that don’t have the resources that larger organizations do,” Farshchi said. “So I worry as the insurance market evolves, the premiums and the coverage levels are getting such that is very difficult.”

Equifax was a victim of one of the country’s most infamous breaches, when in 2017 the data of 147 million Americans were stolen by hackers. The company settled for hundreds of millions of dollars with the Federal Trade Commission.

Experts have urged companies to assume that any outside program is vulnerable to hacking, a position known as “zero trust.” This way, they can take the necessary measures to address the attack.

The United States has been on heightened alert when it comes to cybersecurity issues. Over the last two years, a number of high-profile cybersecurity breaches have impacted a software company, an oil transporter, and a meat producer. Those cybersecurity problems have triggered legislation that requires that the federal government be alerted when critical industries suffer such breaches.

After Russia invaded Ukraine early last year, a number of cybersecurity hacks emerged from those countries, according to an Atlas VPN report shortly after the invasion.

Continue Reading

Cybersecurity

CES 2023: Consumers Need to Understand Personal Cybersecurity, Says White House Cyber Official

Consumers must better understand how to weigh risks and protect themselves in the digital world, said Camille Stewart Gloster.

Published

on

Photo of John Mitchell, Tobin Richardson, Amit Elazari, and Camille Stewart Gloster (left to right)

LAS VEGAS, January 7, 2023 – In addition to building a more robust cybersecurity workforce, policymakers should consider consumer education, said Camille Stewart Gloster, deputy national cyber director for technology and ecosystem for the White House, speaking Saturday at the Consumer Electronics Show.

CES 2023 has featured numerous discussions of cybersecurity in sectors ranging from transportation to Internet of Things home devices. On Thursday, an official from the Department of Homeland Security argued that manufactures should design and pre-configure devices to be secure, thus reducing the security burden on consumers.

For their own protection, consumers must better understand how to weigh risks and protect themselves in the digital world, Stewart Gloster said Saturday. “The sooner that people understand that their physical security and digital security are inextricably linked the better,” she argued. According to the panel’s moderator, Consumer Technology Association senior manager for government affairs John Mitchell, 82 percent of data breaches in 2021 involved “the human element, stolen credentials, phishing, misuse.”

Stewart Gloster’s team is working on a national cyber-workforce and education strategy, she said, which will address the federal cyber workforce, the national cyber workforce, cyber education, and “digital safety awareness.”

Stewart Gloster said workforce initiatives should promote the participation of “people of a diverse set of backgrounds who are highly skilled and multidisciplinary who can take a look at the problem space, who can apply their lived experiences, apply the things they’ve observed, apply their academic backgrounds to a challenging and ever evolving landscape.”

Continue Reading

Signup for Broadband Breakfast News



Broadband Breakfast Research Partner

Trending