Data Security | News
Virginia Commonwealth U Uses Video To Communicate Data Breach Details
- By Dian Schaffhauser
Virginia Commonwealth University has put together a video laying out the details of a potential security vulnerability that struck the campus last month to inform those who may have been affected during the data breach. The breach involved nearly 176,567 current and former students, staff, and faculty members, according to the university's Technology Services organization. VCU has 32,000 students at two Richmond-based campuses and a medical center.
As part of its response in the wake of the discovery of the security incident, the institution has sent a blanket e-mail to all potential victims, began the process of sending out first-class letters to the same group, developed a dedicated Web site about the incident to inform the community, and posted a video to YouTube and reused on its own site, featuring interviews with the school's CIO and its information security officer. Information about the breach also appears as a link on the home page of the university Web site.
As the university has made public, IT people discovered the intrusion Oct. 24, during a "routine monitoring" of servers. The server was taken offline, and VCU began a forensic dissection to understand what activities had taken place and how. According to the investigation, the machine had been infected with an Internet worm six days earlier, allowing an intruder--later identified as being someone offsite--to access the server and use it as a platform to compromise other servers on the network. That server held no personal data. The intruder set up two accounts on a second server and accessed that second server for 16 minutes Oct. 19.
That second server, which lay behind the university's firewall, is used to house applications that transfer data among university systems, such as Banner, and applications for parking, ID cards, and health systems. It stored 10 files holding sensitive data such as Social Security numbers, date of birth, and contact details.
According to CIO Mark Willis, because that second server was only accessed for a short time, during which the intruder had established accounts and loaded new files onto the server, the university doesn't believe the intent was to access personal data. "Our investigation did not show that the data was stolen," he noted in the video.
In the same video, Dan Han, information security officer, explained that the lag between the time of discovery and the time the breach was communicated to affected people was owing to the time-consuming nature of the forensic investigation. It "takes time," he said, "to determine the scope of the incident as well as any type of information that could have been compromised [as well as to] determine whether any information was breached, how the attackers got in, and to understand what information was out there on these servers."
He reiterated the university's belief that there's a "very low risk of actual compromise of personal data," noting, "It really seems like the attacker wasn't after the data."
The university has handed evidence of its analysis over to campus police as well as the Federal Bureau of Investigation. Willis said IT security staff members have removed the initial server, which was infected. They have also "added some layers of security around these servers and changed the security architecture to provide a little bit more protection." He added that the IT team was also bringing in external consulting firms to perform a "top to bottom assessment to look at our security procedures to make sure we're following best practices."
Dian Schaffhauser is a writer who covers technology and business for a number of publications. Contact her at email@example.com.