Colleges Face Greater Challenges in Stopping Data Breaches

Colleges and universities face greater challenges in stopping data breaches than other kinds of organizations and are on track to experience the same number of data breaches in 2010 as they did in 2009, according to a company that sells security applications for protecting databases. According to a report from Application Security's research arm, for the first seven months of this year 32 breaches have been reported, compared to a total of 57 in 2009. Three quarters of those breaches involve unauthorized access to databases maintained on institutional servers.

AppSec's Team SHATTER (Security Heuristics of Application Testing Technology for Enterprise Research) said the proliferation of data breaches in higher ed can be attributed to several factors.

Although campus database breaches face the same exploitation techniques as companies, such as SQL injections on public-facing Web sites and unencrypted data on lost laptops, there several risks unique to higher ed:

  • IT staff is often recruited from the student body, resulting in less experience and higher turnover;
  • Students with limited training and supervision may have access to sensitive information;
  • Open student terminals and workstations may be placed on the same networks as sensitive databases;
  • A high turnover of students generates high turnover of accounts and credentials;
  • Different colleges within a university may have their own IT staff and policies, inhibiting central policy management enforcement; and
  • Budget constraints can lead to the use of unsupported and unprotected legacy systems.

Also, because of the number of students, staff, faculty, and parents in campus business, institutions maintain numerous databases with names, addresses, financial information, credit card numbers, Social Security numbers, and healthcare records.

On top of that, reported AppSec, students and faculty members "frequently log in and out of personal and public computers, accounts are left open, computers are left logged on, and data can be easily lost amid the day-to-day shuffle."

The most common methods of obtaining database administrator privileges, said AppSec, include:

  • Exploiting weak, blank, or default access controls;
  • Exploiting vulnerabilities in an application or operating system; and
  • Finding a valid login and password by brute force, guessing, stealing, or with the help of a Trojan.

The company cited a 2009 Ponemon Institute statistic that found that the typical breach costs an average of $204 per compromised record. This encompasses multiple expenses related to technical, legal, administrative, and customer support.

The report offered six best practices to help counteract data breaches:

  1. Conduct a database discovery to expose rogue databases that may exist on the network.
  2. Classify databases to identify those that maintain personal data.
  3. Do a database assessment to identify vulnerabilities, misconfigurations, and compliance.
  4. Prioritize remediation issues based on the level of threat.
  5. Begin the fixes.
  6. Continue monitoring the databases for gaps in protection.

The report can be found here.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.

  • multiple computer monitors connected by glowing blue lines in a network grid

    Gartner Forecasts Increased Spending on Desktop as a Service as Cost Optimization, Sustainability Drive Adoption

    Gartner's 2025 Magic Quadrant for Desktop as a Service reveals that while secure remote access remains a key driver of DaaS adoption, a growing number of deployments now focus on broader efficiency goals.

  • stylized figures, resumes, a graduation cap, and a laptop interconnected with geometric shapes

    OpenAI to Launch AI-Powered Jobs Platform

    OpenAI announced it will launch an AI-powered hiring platform by mid-2026, directly competing with LinkedIn and Indeed in the professional networking and recruitment space. The company announced the initiative alongside an expanded certification program designed to verify AI skills for job seekers.

  • young man in a denim jacket scans his phone at a card reader outside a modern glass building

    Colleges Roll Out Mobile Credential Technology

    Allegion US has announced a partnership with Florida Institute of Technology (FIT) and Denison College, in conjunction with Transact + CBORD, to install mobile credential technologies campuswide. Implementing Mobile Student ID into Apple Wallet and Google Wallet will allow students access to campus facilities, amenities, and residence halls using just their phones.