Report: 7 in 10 Attempted Data Breaches in Education Are Financially Motivated

Nearly three-quarters, 70 percent, of cybersecurity incidents in education are motivated by the possibility of financial gain, according to Verizon's 2018 Data Breach Investigations Report (DBIR).

One in five attacks on educational institutions were motivated by espionage, often targeting sensitive research, and 11 percent of attacks are "just for fun," according to the report.

This year's report looked at more than 53,000 incidents and 2,300 data breaches from five countries. For the purposes of the report, an "incident" is defined as, "A security event that compromises the integrity, confidentiality or availability of an information asset," whereas a data breach is, "An incident that results in the confirmed disclosure — not just potential exposure — of data to an unauthorized party."

Human beings are a major security weakness across all industries, with companies being "nearly three times more likely to get breached by social attacks than via actual vulnerabilities," according to information released by Verizon.

Financial pretexting — attacks in which the attacker tricks someone into releasing information under false pretenses, such as telling the victim they are conducting a survey or pretending they are a customer who has lost their login information — has boomed, increasing fivefold over the last year. More than half of the financial pretexting attacks recorded by Verizon this year were targeted specifically at human resources staff.

Also across all industries, ransomware was the most prevalent form of malicious software, accounting for 39 percent of malware attacks.

Key findings of the report specific to the education industry include:

  • There were 292 incidents recorded, with 101 confirmed to have disclosed data;
  • Most attackers, 81 percent, were from outside the organization, with internal actors accounting for only 19 percent of attacks;
  • Of the data compromised in attacks on educational institutions, 72 percent was personal, 14 percent some kind of secrets and 11 percent medical;
  • Hacking is the most common action type for incidents in education, accounting for 72 percent of all incidents — largely because of the prevalence of denial-of-service attacks against educational institutions — and 44 percent of breaches; and
  • 14 percent of education breaches featured a causal error by an employee.

To read the full report, visit verizonenterprise.com.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • The AI Show

    Register for Free to Attend the World's Greatest Show for All Things AI in EDU

    The AI Show @ ASU+GSV, held April 5–7, 2025, at the San Diego Convention Center, is a free event designed to help educators, students, and parents navigate AI's role in education. Featuring hands-on workshops, AI-powered networking, live demos from 125+ EdTech exhibitors, and keynote speakers like Colin Kaepernick and Stevie Van Zandt, the event offers practical insights into AI-driven teaching, learning, and career opportunities. Attendees will gain actionable strategies to integrate AI into classrooms while exploring innovations that promote equity, accessibility, and student success.

  • illustrated university campus with modern buildings, glowing binary code streaming straight and dynamically from multiple directions, integrated into the architecture, surrounded by stylized trees, grass, and walkways

    3 Ways Institutions Can Become Data-Driven Organizations

    Faced with declining enrollments and changing demographics, colleges and universities must make use of data and analytics to better serve students.

  • NVIDIA DGX line

    NVIDIA Intros Personal AI Supercomputers

    NVIDIA has introduced a new lineup of AI-powered computing solutions designed to accelerate enterprise workloads.

  • digital network with glowing blue and red lines, featuring multiple red arrows shifting in different directions

    Report: Attackers Change Tactics as Ransomware Payoffs Decline

    Attackers are changing tactics as they collect less money from ransomware payoffs, according to a new report from Chainalysis, a blockchain analytics firm.