
As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their autumn rhythms, cyberthreats do the same—hackers return each academic year armed with a fresh arsenal of tricks.
Rajiv Kohli, John N. Dalton Memorial Professor of Business at William & Mary’s Mason School of Business, warns that “as students, faculty, and staff return to the new school year, new cybersecurity threats await.” He adds that, in addition to the classic fake email from the Dean or a Professor asking to send gift cards, new threats will be targeted and timed. “Managed service providers (MSPs) should be on the lookout for email or text traffic originating from servers of foreign or unverifiable origins, especially when they are mass mailings, and flag them as spam or unknown.”
Emerging scams
Additionally, Kohli warns of new scams that begin as emails or text messages, often impersonating faculty members. These messages may invite students to apply for a research project, register for parking, pay fees electronically, or pick up a new ID card. Each message is crafted to appear legitimate while attempting to deceive recipients.
“Such messages can trick people into clicking a link that can steal their school password and allow access to private information about billing, financial aid, and grades,” Kohli explains. He adds that once armed with this information, hackers can also alter the bank routing numbers or electronic funds transfer (EFT) information. Hackers can intercept tuition payments and redirect them away from the educational institution.
“Recipients are more susceptible when coming back to school because they are likely to take calls or text messages from numbers that are not in their contacts,” Kohli notes, warning that MSPs will need to be on high alert to protect their users. “Because hackers look for the weakest link, they are more likely to target students and staff through social engineering to enter computer systems, instead of trying to break into them. The new hacks are most likely to appeal to the recipient’s trust, generosity, and social values.”
Proactive security essential as threats evolve
AJ Thompson, Chief Commercial Officer at Northdoor, tells SmarterMSP.com that schools, like many small and medium-sized enterprises (SMEs), face the challenge of managing complex security demands with often limited internal IT resources. “The current cybersecurity landscape presents evolving threats that necessitate a comprehensive and proactive approach.”
According to Thompson, schools face a range of emerging threats, including:
- Phishing and social engineering: These remain a primary attack vector, often leading to credential theft or malware deployment. The start of a new school year brings a surge in communication, which makes it easier for attackers to impersonate legitimate sources. Wi-Fi phishing is a particular concern, as it can trick users into connecting to malicious networks.
- Ransomware: This continues to pose a serious risk by encrypting critical data and demanding payment for its release. Schools may be especially vulnerable due to weaker backup strategies or limited network segmentation. Implementing solutions that provide secure shadow backups can help mitigate the impact of such attacks.
Data leakage and compliance issues
“Schools manage vast amounts of Personally Identifiable Information (PII), Protected Health Information (PHI), and other sensitive data,” Thompson notes. He shares that increasing demands from compliance frameworks, such as PCI, GDPR, and cyber insurance, make data governance more critical than ever.
“Misconfigured cloud applications or shared sensitive data can lead to serious breaches,” Thompson explains. Other threats include vulnerabilities in cloud applications and risks associated with endpoint devices.
- Implement a unified security platform: Instead of juggling multiple disparate security tools, schools should consolidate them into a single, easy-to-use platform that addresses all cybersecurity needs. This approach simplifies operations and reduces the complexity of managing multiple vendors.
- Prioritize endpoint security and detection & response (EDR): All endpoint devices should be equipped with capabilities that automatically detect and log devices, scan for malware, and provide real-time protection by identifying and neutralizing threats. Key features include Advanced Threat Control to block suspicious processes, Device Posture to enforce policies based on vulnerabilities, and Quick Actions for remote response.
Thompson also advises schools to strengthen email security. “Email is a primary attack vector. Implement solutions that offer real-time detection and protection for incoming emails against phishing and malware.” He emphasizes the importance of features such as secure messaging for sensitive communications, API-based cloud email protection for seamless integration, and quarantine or warning modes to manage suspicious emails. Moreover, he highlights the value of user feedback mechanisms that allow individuals to report phishing attempts effectively. “MSPs are uniquely positioned to assist schools that lack dedicated in-house cybersecurity teams.”
Unified security platforms and endpoint protection are just the beginning. There’s more MSPs can do to keep staff and students safe, and next week, we’ll dive into those strategies.
Photo: andreyangel / Shutterstock
This post originally appeared on Smarter MSP.