Data Breaches Put a Dent in Colleges Finances as Well as Reputations - Technology - The Chronicle of Hi...



Similar documents
Cyber attack on Twitter, 250,000 accounts hacked

How to Prepare for a Data Breach

KEY STEPS FOLLOWING A DATA BREACH

How To Buy Cyber Insurance

CYBERSECURITY: Is Your Business Ready?

Cyber Insurance: How to Investigate the Right Coverage for Your Company

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You

Data Breaches in Higher Education

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised

HIPAA Breach UPDATED 9/21/15

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

Aftermath of a Data Breach Study

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Cyber Security Protecting critical health care information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Brief. The BakerHostetler Data Security Incident Response Report 2015

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Cybersecurity y Managing g the Risks

Risk and responsibility in a hyperconnected world: Implications for enterprises

Managing cyber risks with insurance

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Cyber Security Management

Third Annual Study: Is Your Company Ready for a Big Data Breach?

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Cyber Security in the Commercial Sector IDC Private Study: Final Report. Steve Conway Earl Joseph Bob Sorensen July 24, 2015

Cybersecurity: Protecting Your Business. March 11, 2015

How To Find Out If You Were Hacked By An Employee Of Ancient.Com

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Impact of Data Breaches

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

Cyber Insurance as one element of the Cyber risk management strategy

TechTarget Enterprise Applications Media. Pocket E-Guide

Why Privacy Laws Matter To Commercial Landlords

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

Cyber security Building confidence in your digital future

Cyber Risks in the Boardroom

Executive Summary. Introduction

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Need for Cyberliability Insurance Continues to Grow

Five Questions to Ask Before Your Next Healthcare Data Breach

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

AB 1149 Compliance: Data Security Best Practices

2014: A Year of Mega Breaches

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

By Daniel E. Frank and Don Borelli

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Beazley presentation master

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

cyber invasions cyber risk insurance AFP Exchange

Cyber Liability & Data Breach Insurance Claims

Anatomy of a Hotel Breach

Collateral Effects of Cyberwar

Cybersecurity and Privacy Hot Topics 2015

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

e-discovery Conference

The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

What Data? I m A Trucking Company!

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Who s next after TalkTalk?

The Five Most Common Cyber-Attack Myths Debunked

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

The Age of Data Breaches:

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

FORMER CMSP AND PATH2HEALTH MEMBERS YOU MAY BE AFFECTED BY ANTHEM DATA BREACH

CYBER SECURITY SPECIALREPORT

Cybersecurity Workshop

Data Security Incident Response Plan. [Insert Organization Name]

Cyber Risks Connect With Directors and Officers

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, :40 PM Subject: Important message from Anthem, Inc.

Reducing Cyber Risk in Your Organization

Law Firms and Cyber Security

CSR Breach Reporting Service Frequently Asked Questions

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

IAPP Global Privacy Summit 2014 The SEC and Cybersecurity: What Every Publicly Traded Company Must Know

The Top Ten of Information Security - For 2015

How To Protect Your Data From Theft

The economics of IT risk and reputation

CGI Cyber Risk Advisory and Management Services for Insurers

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

ACE Advantage PRIVACY & NETWORK SECURITY

MAKING THE RIGHT CHOICE

Transcription:

Page 1 of 8 Technology March 17, 2014 Data Breaches Put a Dent in Colleges Finances as Well as Reputations By Megan O Neil The costs of a cyberattack on the University of Maryland that was made public last month will run into the millions of dollars, according to data-security professionals who work in higher education. Such a financial and reputational wallop threatens many colleges that are vulnerable to serious data breaches, experts say. Crystal Brown, chief communications officer at Maryland, says an investigation into the theft of 309,079 student and personnel records, dating to 1998, is being led by the U.S. Secret Service. As part of its response, the university has contracted with outside forensics experts and is notifying all affected individuals. It is also providing five years worth of free credit-protection services to all those affected. A tally of costs related to the breach is not yet available, Ms. Brown says. But several data-security professionals interviewed by The Chronicle say the total will reach seven figures. "You are talking about 300,000 people spread across the continental U.S. and you offered them all credit monitoring, and you had a lawyer, and you had an IT forensics firm my very conservative estimate would be a couple million dollars," says Paul G. Nikhinson, a manager of privacy-breach-response services with the Beazley Group, which sells cybersecurity insurance to colleges. The Maryland case is one of several data-security breaches reported by colleges in recent weeks. On February 25, Indiana University said a staff error had left information on 146,000 students exposed for 11 months. A week later, the North Dakota

Page 2 of 8 University system reported that a server containing the information of 291,465 former, current, and aspiring students and 784 employees had been hacked. Few institutions budget in advance for data breaches, according to college officials and data-security professionals. Cybersecurity insurance in higher education remains a rarity, despite a consensus among those working in the field that the likelihood of such a breach involves "when," not "if." The list of potential expenses is long. It includes forensics consultants, lawyers, call centers, websites, mailings, identityprotection and credit-check services, and litigation. Breaches can prompt major campus projects, such as risk-management reviews, campuswide encryption, and tests to determine how vulnerable networks are. "For the organization itself, it is like a multiheaded hydra," Mr. Nikhinson says. "There are so many things going on at once. Depending on the characteristics of the event, there are usually five or six expensive things that are going to make up the response process." Price tags vary depending on the nature of the incident where and how the breach occurred and the number of records affected. The capacity of in-house information-technology and communications staffs also figures heavily in the final bill. Contracting for outside help typically means additional costs starting in the tens of thousands of dollars. "The first thing you might think about is forensics," says Cathy Bates, chief information officer at Appalachian State University and a member of the Higher Education Information Security Council. "Do you have the capability to do it in-house, or will you need to call in forensics expertise? That might be your first outlay of cash. It can be expensive. But again, it really depends on the type of security breach that you are working with."

Page 3 of 8 Timothy P. Ryan, managing director of the cyber-investigations practice at Kroll Inc. and a former FBI agent, says he has worked on some forensics investigations at colleges that were completed in two weeks and others that took months. Hiring an outside forensics team to investigate a small breach can be done for "under $50,000," he says, with costs for larger incidents escalating from there. Data breaches in higher education cost colleges an average of $111 per record a figure that calculates in the damage to the institution s reputation according to a 2013 study published by the Ponemon Institute, which studies cybersecurity and data protection. The average per-record cost across industries including government, health care, and retail is $136, the study found. Titled "2013 Cost of Data Breach Study: Global Analysis," the report included 277 organizations in nine countries and focused on breaches involving 1,000 to 100,000 records. "There are probably a lot of data breaches in higher education that go undetected, probably more so than in other industries," says Larry Ponemon, founder and chairman of the institute. "The universities are not aware of data leakage and the harm that can result. It can cost universities a lot of money." Indiana University has spent about $75,000 on an information call center since officials announced its security lapse, says a spokesman, Mark Land. The university also spent about $6,200 mailing notifications to 6,200 affected people for whom it did not have email addresses. Staff time spent on the security lapse has totaled about 700 hours, Mr. Land says. The university does not budget for potential data breaches and does not have cybersecurity insurance, he adds. "While this will end up costing the university from a financial standpoint, our biggest concern is making sure we do everything we can to answer questions and to provide support for those affected by the potential data exposure," he says, "and to ensure

Page 4 of 8 that we strengthen our processes so that this sort of thing does not happen again.". Linda Donlin, at the North Dakota University system, says the forensics investigation there was done at no cost to the university by the Multi-State Information Sharing and Analysis Center, which serves state, local, tribal, and territorial governments. The university system is spending about $200,000 on identity-theft protection services and a call center, she says. Costs related to data-security lapses dating to 2011 at the Maricopa County Community College District, in Arizona, could climb to $17.1-million, says Tom Gariepy, a district spokesman. Trustees have approved contracts including $2.25-million for Oracle to repair the network, up to $2.7-million in legal expenses, and up to $7-million for notification and credit-monitoring services, among other costs. He also confirms that the district has received notice of a class-action lawsuit. Breaches Kept Mum High-profile data breaches cost institutions more than dollars and cents, according to college officials and data-security experts. There are also what some describe as "opportunity losses" and "reputational costs." These can include the embarrassment of having to explain an incident to parents, alumni, trustees, and prospective students. Mr. Ryan, the Kroll investigator, notes that in many states, reporting requirements center on credit-card, health-care, and personally identifiable information. Cases involving theft of research and intellectual property by foreign hackers are often kept mum, he says. The public hears of no more than about half of all data breaches that occur at colleges and universities in the United States, Mr. Ryan estimates. "When it comes to higher education, a lot of it is reputation," says Mr. Ryan. "The Ivy Leagues have a certain reputation to maintain.

Page 5 of 8 If they are besieged by a number of breaches, there is a loss of reputation there. For the same reason schools want winning sports teams, they don t want to be that school that is constantly getting breached." Cynthia J. Larose, an attorney in Boston with the firm Mintz Levin who advises colleges on data-security-breach compliance and response, says reputational costs are real but hard to pin down. "It is probably much harder for institutions of higher ed to quantify than it is for retailers, because retailers can see it in their stock price, they can see it in their sales," Ms. Larose says. "Target can directly track a drop in fourth-quarter sales," she says, referring to a case in which hackers accessed as many as 40 million debit-card and credit-card accounts used in the retailer s transactions from November 27 to December 15, 2013. "Will enrollment drop at the University of Maryland because of this?" she says of the recent breach there. "I kind of doubt it. The alumni-fund-raising office might see a downturn in giving I don t know. That would be an interesting metric to track." Keeping Costs Down Cybersecurity insurance is both expensive and hard to get, says Ms. Bates, of Appalachian State. "The experience that I have had a couple of times in working with insurance companies that offer cyberinsurance is that they have a checklist of what you need to show you have in place with your security practices," she says. "Very often you have to have such a strong security posture before you can even be allowed to get the insurance that it would take you a lot of work on your part to be able to even be eligible." She does see many colleges working to build in-house forensics expertise, or to establish channels through which to reach out and get it quickly should the need arise.

Page 6 of 8 One way to keep costs down is to have standing relationships and contracts with service companies that can be activated if an incident occurs, Ms. Bates says, noting that many colleges and universities already have such arrangements in place. As much as they keep those responsible for colleges data security up at night, news of significant data breaches can help information-technology and data-security officials make their case with top administrators and trustees. "It can t be a conversation that is led by the IT department, and too often it is," says Joseph Krause, a managing director at Coalfire Systems Inc., an information-technology-security firm that works with higher-education clients. "So this kind of notice, this kind of public exposure for a highprofile breach, helps elevate the conversation out of the IT group and into the executive level and into the boardroom." Those working on data-security issues in higher education say they have a particularly challenging task in preserving the open, accessible culture characteristic of the American university while also establishing strong security. They expect to see more headlines in the coming months like the ones out of Maryland. The problem of data breaches in higher education, many say, is likely to get worse. "Higher ed is an active target," Ms. Bates says. "It is not like people are accidentally happening upon us. They are actively pursuing us and trying to get our data." "I think all of us are actively looking at ways to not only be preventive but to deal with this in the best possible way that we can," she says. "You feel the weight of the whole situation your shoulders. You really want to try and create the best outcome you can for anyone who may be impacted, as well as for the university."

Page 7 of 8 6 Comments DarwinWeeps A particular irony with research universities is that they often have cybersecurity programs and research centers. This is true for both Maryland and Indiana: http://www.cyber.umd.edu/ http://cacr.iu.edu/ Colleges and universities, with tens of thousands of users of in-house email systems and users of varying sophistication, are probably easy targets for phishing attacks. Former PhD. student Please note the University of Maryland offered its students free credit monitoring...indiana University told students like myself that it is the students' problem not the problem of Indiana University. Indiana University accepted no responsibility and continues not to provide students with free credit monitoring for the 11 month breach. Doesn't that make you want to enroll there? 22198178 "It can t be a conversation that is led by the IT department, and too often it is," says Joseph Krause, a managing director at Coalfire Systems Inc., an information-technology-security firm that works with higher-education clients. This is the most important insight in the article. As usual, the focus is on a retrospective post mortem. Prospective approaches are about information management, not simply technical security. Remember the clue, "follow the money"? In information privacy and security, it is "follow the data." Once an institution flips the emphasis from technology to information, not only will the entire institution mature to "industry level standards" so that we, in higher education, do not always have to countenance the criticism that our sector is particularly vulnerable and porous, but we can lower risk while enhancing our missions. frederick James I am grateful and proud that my second job after the Army was to bulletproof the first online student registration system at Florida Institute of Technology. My overriding thought then, and decades later at George Washington University for the Y2K effort, was that if my fellow students would spend their energy in helping build the systems rather than hacking in to break them, everyone would be a lot better off. It seems so juvenile to try and penetrate a system covertly and so noble to use your talent to build and enhance. My suggestion and leadership challenge is to channel and guide all that energy in a positive direction. My advice to all those misguided Geniuses sitting before their computer in those dimly lit, smoke filled rooms.. Aim high. Come out into the light, be good and do good. jabberwocky12 There is probably a lot more of this going on than is reported here. In most

Page 8 of 8