Higher Ed Data Breaches at Near-Record High in 2012

Nobody knows who will win the NCAA Men's Division Basketball Championship; the final game won't happen until April 6. But just as surely as bracket mania strikes the country this month in response to college basketball, so too does Application Security release the final rankings of this year's dubious roster of higher education "data breach madness" winners. These are colleges and universities that have experienced a notable data breach in 2012.

This year's declared winner is the University of Nebraska, which reported a breach of 654,000 records on May 25, 2012. Rounding out the data breach "Final Four" were the University of North Carolina (350,000), Arizona State University (300,000), and Northwest Florida State College (279,000). Three of those breaches also made the top 10 higher ed data breaches of all time.

To develop its rankings, the company used publicly reported data breaches compiled by Privacy Rights Clearinghouse. The bracket format reflects the number of personal records affected by each breach. The larger the breach, the further each institution advanced in the "tournament," until an eventual "champion" was crowned.

The results were released by TeamShatter, the company's research arm. Researchers there noted a "substantial uptick" in total records breached. In 2012, the count was nearly two million, a tally surpassed only in 2006, which had a reported 2.03 million records breached. (Tracking by Privacy Rights Clearinghouse began in 2005.)

The company cited a finding by Ponemon Institute, which researches the costs of data breaches. The average cost per compromised record in an education environment is $142, which puts the cost of the U Nebraska data breach at about $92 million, according to Application Security.

"When we look back at the higher education data breaches in 2012, we can see that the hackers are clearly getting smarter at stealing data," said Alex Rothacker, director of TeamShatter's security research. "The reported breaches remain on the low side, yet the stolen data is over three times what we saw in 2011."

In the case of U Nebraska, an undergraduate student there was charged with hacking into a protected computer system. According to the university, "this was a skilled attack on our system that was discovered and shut down within hours of its discovery."

The University of North Carolina at Charlotte suffered two breaches, one caused by a system misconfiguration and incorrect access settings, which resulted in data being accessible on the Internet, and the other in which files containing sensitive data were stored in a manner that left contents open to the Internet.

At Arizona State, an encrypted file containing user names and passwords was downloaded by an unauthorized person. And at Northwest Florida State, hackers accessed at least one folder on a server that contained personally identifiable information.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • glowing brain above stacked coins

    The Higher Ed Playbook for AI Affordability

    Fulfilling the promise of AI in higher education does not require massive budgets or radical reinvention. By leveraging existing infrastructure, embracing edge and localized AI, collaborating across institutions, and embedding AI thoughtfully across the enterprise, universities can move from experimentation to impact.

  • row of digital padlocks

    2026 Cybersecurity Trends to Watch in Higher Education

    In an open call last month, we asked education and industry leaders for their predictions on the cybersecurity landscape for schools, districts, colleges, and universities in 2026. Here's what they told us.

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.