Duh! Learning Centers Are
Learning That Students & Faculty’s Social Security #’s & personal Data Are
More Important Than Their Minds…
By Nick Ashton, Founder, CEO,
Tracometry Group of Companies.
Centers of
Learning are also epicenters for the theft of personal data.
It is
stated that online thieves have increasingly sought sensitive and valuable data
from educational institutions. Last year, security breaches included
possible exposure of over 2.5 million Social Security and bank account numbers
associated with an Arizona community college system, 74,000 Social Security
numbers of University of Delaware students and staff, 145,000 applications to
Virginia Tech, and hundreds of thousands of records from Indiana University.
In the two
weeks between recent revelations that hackers stole data on students, alumni
and faculty from the University of Maryland-College Park and the Johns Hopkins
University, nearly 360,000 records were swiped in similar attacks at schools in
Pennsylvania, Indiana and North Dakota, contact has been made to these educational
behemoths to advise and inform of how they can stop dead in their tracks,
Hackers, Phishers and Man in the Middle Brutal Attackers.
Results, very disappointing and D grade for
communication skills.
When
someone who is knowledgeable reaches out to assist, albeit they are the developer
of the finest patented proprietary end to end data in motion security and you
ignore and fail to even return the telephone call, would you send your child to
such a place of learning?
Isn't about having an open mind and absorb all you can from those that know more than you?
Colleges
and universities are attractive targets for hackers because there are many
access points into their networks, especially Hotspots, which contain not just
financial and personal data but also valuable intellectual property. That
threat is forcing academics to reassess the way they keep and protect vast
collections of information, often held in decentralized computer networks
accessible to thousands of students, professors and researchers.
There lies the problem! A password is typed in, that then lets the
individual enter the treasure trove of information.
Who is it
typing the password?
Is it the owner or
the cyber terrorist? The system has no
earthly idea! Then they merrily go about their sordid trade of thievery, causing havoc for those that will now suffer through the theft of information.
Since
January 2013, more than 50 colleges, universities and school systems across the
country have been the targets of attacks that may have compromised personal information,
according to the Privacy Rights Clearinghouse, a California-based
consumer-advocacy group.
"It's
been a long-standing concern that our culture of collaboration and trust kind
of flies in the face of the need for security to be more closed, more alert and
more skeptical and cynical," said Rodney Petersen, senior policy adviser
for SecuriCORE, a higher-education information security project at Indiana
University. Just as campuses have added gates, guards and surveillance cameras
on in recent decades, they may have to end the era of open access to online
resources, he said.
The
University of Maryland and other institutions reeling from major data thefts
are redoubling efforts to confine and protect sensitive data spread across
networks - sometimes so scattered that it's a complicated task simply to learn
where the data might be hiding and vulnerable. The growing security risks may
also require new barriers around networks that have been traditionally open in
the name of academic discourse and unfettered access.
But unlike
retailers, banks and other companies that guard sensitive data, universities
can't mandate what devices or software are used to access their networks. And
they must accommodate students and researchers spread across the globe, making
it more difficult to prevent and detect security breaches.
It is understanding BYOD is
NOT
an ISSUE!
KEYTALK has resolved this for over twenty
years and has been protecting governments and enterprise in Europe against such
issues.
Since a
breach compromised names, Social Security numbers and birth dates of 287,580
students, faculty and staff at the University of Maryland on Feb. 18, officials
said they have purged more than three-fourths of the sensitive records, some of
which dated back to 1992. But they are also hastening to learn how vulnerable
the university's data remains, and how to prevent future attacks.
A
cyber-security task force that university President Wallace Loh called
together within 24 hours of the attack is set to consider whether information
technology systems on campus should be centralized to keep sensitive data in
one place, rather than scattered across various colleges and departments. The
group, which met for the first time last week, also is launching an effort to
scan all university databases for personal information that could be at risk.
Similar
actions have taken place at Johns Hopkins, where officials on March 6 announced
an attack that occurred late last year compromising names and email addresses
of 848 bio-medical engineering students, as well as confidential evaluations of
classmates. In response to attacks and at the urging of auditors, the
university has moved to prioritize what data needs the highest levels of
protection, said Darren Lacey, the university's chief information security
officer.
It is not
about where you store the information, it is about how you allow access.
There is an
even simpler method which is more cost effective, virtually zero management and
productive, KEYTALK!
Understand,
that by using your log-in human credentials, (password), you are the total opposite of being secure! Your data,
transactions and or your Identity is at major risk to be stolen by hackers,
phishers and man in the middle brutal attackers.
KEYTALK, not only it secures the connection
end to end but KEYTALK also distributes short lived device DNA related keys
for access. DNA is pulled out the device based on a combination of 12 to 17
device components.
This means
you are hidden in the KEYTALK bullet resistant end to end
data in motion tube, totally anonymous to all!
This works to a major advantage, especially in the education campus
environment. The device is their secure
connection and once the transaction of information is finished, there is
nothing on the device to even show there was a connection.
We ask you
to become more educated and take a leaf out of the Book of Learning, research,
call and let us explain in simple terms on how and why KEYTALK is the
Answer. This will give you A+
grade to all, including the parents who fund your establishments.
WE are in the NOW and
KEEP YOU; in the KNOW…
Worldwide Call: +1 (317)
426.0110
Key Talk –
Man-In-The-Middle, Hacking & Phishing Solutions
Straight Talking Key
Talking… KEYTALK!
Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Netherlands, Lithuania, K.L. Malaysia
Tracometry
Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex
CM18 7jF
Copyright 2014