Higher Ed Data Breaches at Near-Record High in 2012

Nobody knows who will win the NCAA Men's Division Basketball Championship; the final game won't happen until April 6. But just as surely as bracket mania strikes the country this month in response to college basketball, so too does Application Security release the final rankings of this year's dubious roster of higher education "data breach madness" winners. These are colleges and universities that have experienced a notable data breach in 2012.

This year's declared winner is the University of Nebraska, which reported a breach of 654,000 records on May 25, 2012. Rounding out the data breach "Final Four" were the University of North Carolina (350,000), Arizona State University (300,000), and Northwest Florida State College (279,000). Three of those breaches also made the top 10 higher ed data breaches of all time.

To develop its rankings, the company used publicly reported data breaches compiled by Privacy Rights Clearinghouse. The bracket format reflects the number of personal records affected by each breach. The larger the breach, the further each institution advanced in the "tournament," until an eventual "champion" was crowned.

The results were released by TeamShatter, the company's research arm. Researchers there noted a "substantial uptick" in total records breached. In 2012, the count was nearly two million, a tally surpassed only in 2006, which had a reported 2.03 million records breached. (Tracking by Privacy Rights Clearinghouse began in 2005.)

The company cited a finding by Ponemon Institute, which researches the costs of data breaches. The average cost per compromised record in an education environment is $142, which puts the cost of the U Nebraska data breach at about $92 million, according to Application Security.

"When we look back at the higher education data breaches in 2012, we can see that the hackers are clearly getting smarter at stealing data," said Alex Rothacker, director of TeamShatter's security research. "The reported breaches remain on the low side, yet the stolen data is over three times what we saw in 2011."

In the case of U Nebraska, an undergraduate student there was charged with hacking into a protected computer system. According to the university, "this was a skilled attack on our system that was discovered and shut down within hours of its discovery."

The University of North Carolina at Charlotte suffered two breaches, one caused by a system misconfiguration and incorrect access settings, which resulted in data being accessible on the Internet, and the other in which files containing sensitive data were stored in a manner that left contents open to the Internet.

At Arizona State, an encrypted file containing user names and passwords was downloaded by an unauthorized person. And at Northwest Florida State, hackers accessed at least one folder on a server that contained personally identifiable information.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • open laptop in a college classroom with holographic AI icons like a brain and data charts rising from the screen

    4 Ways Universities Are Using Google AI Tools for Learning and Administration

    In a recent blog post, Google shared an array of education customer stories, showcasing ways institutions are using AI tools like Gemini and NotebookLM to transform both learning and administrative tasks.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Launches Stand-Alone AI App

    Meta Platforms has introduced a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.