The higher education (higher ed) sector has become a prime target for cybercriminals, and cyberattacks are on the rise. Almost 64% of higher ed institutions were hit by ransomware and cyberattacks in 2022. By comparison, 44% of higher ed institutions reported cyberattacks in 2021. Several data breaches at higher ed institutions occurred at the third-party vendor level. And it was platforms hosting online learning systems that were particularly vulnerable.
The administrators of several higher ed institutions, especially those without mature third-party risk management (TPRM) programs, are left with many questions about how and why higher ed has become a prime target for cybercriminals.
Some of the main reasons cybercriminals target higher ed institutions are:
Students often have new credit histories and limited work and residence history making them the perfect targets for identity theft, and university databases are treasure troves for hackers due to the wealth of information they contain. Enrolling students provide their name, address, phone number, date of birth, credit card numbers, social security number, driver's license number, bank account information, and sometimes even their medical records. Hackers can use stolen personal information to open bank and credit card accounts, get fraudulent identification, and engage in various scams and money laundering.
Cybercriminals frequently target .edu and .org addresses since they’re perceived as more trustworthy than .com addresses – especially within university networks. It's amazing how often attackers successfully trick people into revealing sensitive information or installing malicious software on their computers and networks. Students, professors, and staff are unlikely to question an attachment that appears to have been sent by a colleague or administrator.
Here are example scenarios of recent phishing emails to student and staff accounts:
Mundane personal information can also be extremely useful for hackers hoping to impersonate friends or family members as part of a phishing attack. According to a Proofpoint 2022 survey , over 30% of users in the education sector have fallen victim to phishing scams posing as corporate communications, which is double the rate of the general population.
While many higher ed data breaches occurred with third-party online learning platform providers, the need for TPRM does not stop with cloud-based services. Institutions seek to cut administrative costs by contracting with third parties to provide services. That means there is an increase in vendors who have potential access to personal data, including student health services, student housing, and food services, to name a few. Institutions that neglect to implement robust third-party risk management practices play a dangerous and often losing game of cybersecurity roulette.
This is why proper TPRM is needed to protect institutions’ and students’ data. Here are some benefits third-party risk management can bring to the higher education industry:
Institutions should take inventory of all third-party providers and create policies and procedures to ensure that all vendors are evaluated for risk. Colleges and universities must establish robust third-party vendor management programs to protect their students' data and prevent cyberattacks.