Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

After CMU breach, cybersecurity pros give advice | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | #hacking | #aihp


Even an institution that prides itself on being ground zero for cybersecurity innovation isn’t immune to cyber attacks.

This week — coincidentally, Data Privacy Week — Carnegie Mellon University announced that in August 2023, its Information Security Office detected suspicious activity in the university’s computer system. According to the university, a third party accessed files that included the personal information of around 7,300 former students, current students, employees, applicants, and contractors.

Now that the investigation has been concluded, the university says there’s no indication that there has been any fraud or improper use of the information.

“Our information security office secured the system within hours of detection and quickly engaged law enforcement. The university recently concluded its full investigation of the breach and sent notification to anyone whose information may have been compromised,” the university said. “There is no evidence of fraud or inappropriate use of the information from those files. Out of an abundance of caution, CMU is offering credit monitoring and other services through Experian for anyone who may be impacted.”

How rare are cyber attacks?

According to Norton, roughly 2,200 cybersecurity attacks take place every day. The big ones make the news, from the 2019 attack on Baltimore city government to the 2021 ransomware hit on the Colonial Pipeline.

A security breach can have lofty consequences. During his time working in the healthcare industry, Vigilent Ops CEO Ken Zalevsky observed that the health and privacy of patients can be compromised when hospitals are attacked. That’s why it’s vital for institutions to take a proactive approach to protecting their data, he told Technical.ly earlier this month.

“Hospitals are being hacked and breaches [are] occurring, data [are] being lost, and in some cases, even patients [are] being put in harm’s way,” Zalevsky said. The goal of his company and cybersecurity in general should be “safety and security across all industries.”

Cyber attacks aren’t rare and even the most secure institutions can fall prey to them, said Ahmed Ibrahim, teaching associate professor at the University of Pittsburgh’s School of Computing & Information.

“It is very common for organizations to be breached. Every organization is a target. It’s actually almost guaranteed that every organization will be breached,” Ibrahim said told Technical.ly this week. “Thus, what really matters is what you do once you recognize that your organization has been breached. How do you contain such a problem?”

How to protect yourself or your organization from cyber attacks

Given CMU’s statement, Ibrahim said, he doesn’t believe that the individuals who had their info accessed should be overly concerned — in fact, he argued that there is likely more concerning information available about most people on the dark web. Still, it couldn’t hurt to use a credit monitoring service.

The best way for institutions to protect themselves is to follow the latest security best practices, he said, which includes regularly updating their incident response plan.

Plus, “CMU is home for US-CERT: the national Computer Emergency Response Team for the US,” Ibrahim said. “I would recommend that organizations check out latest cybersecurity practice improvements published by CERT.”

Atiya Irvin-Mitchell is a 2022-2023 corps member for Report for America, an initiative of The Groundtruth Project that pairs young journalists with local newsrooms. This position is supported by the Heinz Endowments.

Companies:
University of Pittsburgh / Carnegie Mellon University

Subscribe

Knowledge is power!

Subscribe for free today and stay up to date with news and tips you need to grow your career and connect with our vibrant tech community.

Technically Media

Click Here For The Original Source.


————————————————————————————-

Translate