The Emotional Toll of Data Security in the Business Office The Emotional Toll of Data Security in the Business Office

The Emotional Toll of Data Security in the Business Office

#Business
by Mike Bianco, CISSP
Mike Bianco, CISSP Mike Bianco, CISSP Vice President of Data & Information Security
Read time:

While strong feelings are expected in so many facets of K12 life, the righteous fear of a data breech is too often an afterthought. It shouldn’t be—the whole thing is emotional from start to finish.

First, criminals are deliberately attacking a group of children. No two ways around that.

Then, the accusations fly at the folks in districts just doing their jobs (and who probably got their data snatched too).

Finally, the ripple effects of compromised data follow people (kids!) for the rest of their lives.

Emotions run high because schools care deeply about the welfare of students, but understaffed and underfunded IT teams struggle to keep up with the volume and intensity of criminal cyberattacks. After all, when your whole job is to just to rip off information from unsuspecting schoolchildren, you’re always fresh as a daisy.

How can K12 business offices compete with that? Lean on the team of helpers you deserve (and pay for).

 

Your vendor is here to support you

Vendors should be part of not only the planning but, if you have an incident, vendors should be involved. Your edtech vendors provide support for business continuity and disaster recovery.

Odds are, your system has more security features than you realize. Your support teams can help ensure you’re using every feature available to secure your data—and help you rest easy.

4 Essential Security Features for Your Business Office

 

Be proactive so your reactions can be swift

Here’s a way to shift your mindset: Think about logging in to your own bank account online. You’ll expect to receive a code to prove it’s really you asking to log in—that multifactor confirmation is essential for “the bank of your school” (your ERP) as well.

Any edtech vendor can advise security contacts of the features already available to protect the system from unauthorized access. Plus, other services will do the work of scanning your network from an external standpoint, looking for weaknesses before bad actors can exploit them. This process works both on premises and in the cloud and the data discovered helps both the district and their vendors improve.

Many districts elect to move critical data to the cloud to protect super-sensitive student and financial records from falling into the clutches of criminals all over the world. Cloud hosting is more secure due to redundancy, encryption, 24/7 monitoring, advanced security measures, and regular updates—features not feasible with a limited budget and staffing for school districts.

 

Accept that you’re a target, and prepare accordingly

It's unfortunate to know that schools are considered a soft target for bad actors, but accepting this truth can empower your teams to prepare for if and when a data breach occurs. The days and weeks that follow are not only filled with hard work of recovering data, getting systems back on track, and resuming business, but also speculation and bad press. By accepting ahead of time that this may happen in your district, your communications can be confident, clear, and concise. 

Business office staff are often targeted in phishing scams. A fraudulent link arrives in an email that uses specific, sophisticated social engineering designed to get users to click, which gives the sender access to the business officer’s inbox and email credentials. Keep in mind, this person was targeted specifically because of the level of access their credentials will allow an attacker to gain in a financial system. From there a domino effect using updated credentials result in the attacker gaining access to sensitive systems and locking the employee out of their access to the financial system. Business grinds to an expensive halt.

Most commonly attackers will choose to infiltrate payroll systems and change ACH account information from correct employee accounts to their own, stealing folks’ paychecks. Districts find out when staff report not being paid. Nightmare fuel.

 

We’re all in this together

Turning the tides back to smooth, confident sailing for the business office looks like having frank and empowering conversations and training. It’s a great start to reach out to vendor teams and ensure you’re taking advantage of every security feature possible. In the previous business email compromise example, a rogue MFA alert may have tipped off a savvy business officer before an attacker could strip their original password and create their own.

A confident approach to cybersecurity is within reach. Let us know how we can help.


 

Mike Bianco, CISSP Mike Bianco, CISSP Vice President of Data & Information Security
Share this story:

Large Districts Large Districts


Recent Articles

3 Strategies to Practice Patience in K12 Schools
Less deep breathing, more deep connection. Erin Werra
 
AI Friends and SEL Deserts: Kids Need Nuanced Human Connection More Than Ever
Or, “the price you pay for community is annoyance.” Erin Werra
 
Sowing the Seeds of a Solid Summer
We all know about the summer slide. What can teachers do now to nudge children to retain knowledge? Erin Werra
 



Share Facebook
Twitter
LinkedIn Email
X
Humanity 🤝 Technology
Edtech insight delivered directly to you.

AK12