Education Accounts for 7.3% of Cybersecurity Incidents Across Industries in 2022, Up from 2.8% in 2021

IBM Security, releasing its annual X-Force Threat Intelligence Index for 2023, noted that education, sixth on the list of 10 industries analyzed, jumped from 2.8% of all incidents in 2021 to 7.3% in 2022. The company noted it changed how it examined some of its data to give a more insightful and helpful picture of cybersecurity threats. Key threat highlights in the report include backdoor activity, extortion, phishing, and hacktivism/malware.

Across industries in 2022, extortion attacks accounted for 27% of incidents, deployment of backdoor access 21%, and ransomware attacks 17%. Although there was a 52% drop in phishing seeking credit card data, overall 41% of initial access incidents involved phishing, IBM said, with 62% of those using spear fishing attachment tactics.

In education alone, IBM Security X-Force responded to the following attacks:

  • Exploitation of public-facing applications on initial access (42% of incidents);
  • Spear fishing attachments (25%);
  • Data theft, extortion, and reconnaissance impacts (25% each);
  • Backdoor attacks (20%);
  • Ransomware, adware, and spam (13% each); and
  • Phishing (through service, link, and valid cloud and local account abuse) (8% each).

The company noted that the highest number of attacks were directed at Asia-Pacific areas (67%), followed by North America (27%) and Latin America (6%).

IBM Security gave several recommendations: Manage critical data assets to reduce exposure to attack; include source code, credentials, and other data that could already be out on the web in asset management programs; immediately act on threat intelligence; be prepared for attacks with flexible incident response plans; and have a reputable and competent IR vendor on retainer to help plan, test, and enact incident responses.

"Attacks are inevitable; failure doesn't have to be," the report concluded. "Organizations should develop incident response plans customized for their environment."

To read keynotes of the report, watch video discussions of specific insights, and register to download the report, visit the Threat Intelligence Index 2023 page.

IBM Security X-Force is a team of hackers, responders, researchers, and analysts who provide cybersecurity services. To learn more, visit the X-Force page.

About the Author

Kate Lucariello is a former newspaper editor, EAST Lab high school teacher and college English teacher.

Featured

  • cloud and circuit patterns with AI stamp

    Cloud Management Startup Launches Infrastructure Intelligence Tool

    A new AI-powered infrastructure intelligence tool from cloud management startup env0 aims to turn the fog of sprawling, enterprise-scale deployments into crisp, queryable insight, minus the spreadsheets, scripts, and late-night Slack threads.

  • human figures surrounded by precise arcs with book and gear icons

    Kennedy-King College Rolls Out Holistic Student Support Program

    Chicago's Kennedy-King College is expanding student support services through a collaboration between City Colleges of Chicago and One Million Degrees (OMD), a Chicago-based nonprofit serving low-income community college students.

  • college students in a classroom focus on a silver laptop, with a neural network diagram on the monitor in the background

    Report: 93% of Students Believe Gen AI Training Belongs in Degree Programs

    The vast majority of today's college students — 93% — believe generative AI training should be included in degree programs, according to a recent Coursera report. What's more, 86% of students consider gen AI the most crucial technical skill for career preparation, prioritizing it above in-demand skills such as data strategy and software development.

  • laptop and fish hook

    Security Firm Identifies Generative AI 'Vishing' Attack

    A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.