{"id":405,"date":"2017-05-08T15:18:52","date_gmt":"2017-05-08T15:18:52","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/schools-almost-out-dont-let-cybercriminals-in\/"},"modified":"2019-05-29T12:01:41","modified_gmt":"2019-05-29T12:01:41","slug":"schools-almost-out-dont-let-cybercriminals-in","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/","title":{"rendered":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in"},"content":{"rendered":"<p class=\"wls-paragraph\">When it comes to security, schools have unique challenges. It\u2019s difficult to think of another type of organization that combines the functions of education, healthcare, finance, retail, and research, among the other usual administrative departments like human resources and accounting.<\/p>\n<p class=\"wls-paragraph\">When you couple this breadth of service with an alphabet soup of security compliance regulations, the expectation of an openness of information within and without the organization, and potentially a very limited budget, security becomes orders of magnitude more challenging than usual.<\/p>\n<p class=\"wls-paragraph\">Cybercriminals&nbsp;are seizing this opportunity with increasing force, and schools are feeling the squeeze. In Educause\u2019s <a href=\"http:\/\/www.educause.edu\/visuals\/it-issues\/top-10\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">2015<\/a> poll, security issues occupied the bottom slots of the top ten areas of concern for CIOs and IT leaders in education. In <a href=\"http:\/\/er.educause.edu\/articles\/2016\/1\/top-10-it-issues-2016\" target=\"_blank\" rel=\"noopener noreferrer\">2016<\/a> and <a href=\"https:\/\/www.educause.edu\/research-and-publications\/research\/top-10-it-issues\" target=\"_blank\" rel=\"noopener noreferrer\">2017<\/a>, Information Security was considered the number one IT issue.<\/p>\n<p class=\"wls-paragraph\">For better or worse, the retail and healthcare industries have had their day in the spotlight because of the sheer enormity of the losses from a few of the more notable breach victims. This has forced both industries to address their shortcomings in a very public way, due to governmental and customer pressure. The lack of mega breaches contributing massive numbers of lost records may give some educational institutions a false sense of the size of the problem.<\/p>\n<p class=\"wls-paragraph\">According to the Privacy Rights Clearinghouse, there were only 19 breaches in the <a href=\"https:\/\/www.privacyrights.org\/data-breaches?title=&amp;org_type%5B%5D=259&amp;taxonomy_vocabulary_11_tid%5B%5D=2257\" target=\"_blank\" rel=\"noopener noreferrer\">education sector in 2016<\/a>, comprising fewer than 65,000 records. But of these 19 breaches, 11 report an unknown number of records accessed, so their totals were not included.<\/p>\n<p class=\"wls-paragraph\"><strong><span class=\"block_quote_right\">\u201cChildren are targeted for identity theft at a much higher rate than adults.\u201d<\/span><\/strong><\/p>\n<p class=\"wls-paragraph\">Five other breaches comprising as many as 613,000 more records were not counted, as the total number of records was not verified. Because the dataset is so incomplete, the true scope of the problem is not clear.<\/p>\n<p class=\"wls-paragraph\">Children are targeted for identity theft at a <a href=\"https:\/\/www.allclearid.com\/personal\/2012\/05\/child-id-theft-report-2012\/\" target=\"_blank\" rel=\"noopener noreferrer\">much higher rate than adults<\/a>, though this too is an <a href=\"https:\/\/www.welivesecurity.com\/2014\/04\/22\/how-do-you-know-if-your-childs-id-has-been-stolen\/\" target=\"_blank\" rel=\"noopener noreferrer\">underreported occurrence<\/a>. And the consequences of a school\u2019s security lapse could follow them for a lifetime.<\/p>\n<h2><b>How do you address a threat you can\u2019t measure?<\/b><\/h2>\n<p class=\"wls-paragraph\">One of the first steps that <a href=\"https:\/\/www.welivesecurity.com\/2015\/05\/28\/cyber-risk-analysis-assessment-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">security experts recommend<\/a> is a thorough and ongoing risk assessment. A big part of the point of this process is to get visibility into your environment. This is particularly challenging in school networks as they have a more itinerant population than most other types of organizations, but this simply underlines the importance of making this a regular task rather than a yearly chore.<\/p>\n<p class=\"wls-paragraph\">With that increased visibility, you get a number of additional benefits. Not only does it improve reporting and tracking of security incidents; it helps highlight anomalous events. In an industry where budget cuts seem to be a regular occurrence, it can help justify the necessity of budget items, and help assure more appropriate levels of coverage with whatever money is allotted. And, with better monitoring of assets comes faster responses to security events.<\/p>\n<h2><b>What to do with that information?<\/b><\/h2>\n<p class=\"wls-paragraph\">Now that you\u2019re aware of your assets and their risks, the next step is to mitigate that risk. This may seem overwhelming as the number of threats discovered every day grows by leaps and bounds. Rather than focus on individual threats, it can be helpful to focus instead on how those threats might get into your environment.<\/p>\n<p class=\"wls-paragraph\">Many threats spread stealthily, using automated methods to exploit system and network vulnerabilities. Other threats rely on social engineering tactics to lure victims via the web or email. This points to two separate problems: one that is technological, and one that is entirely human.<\/p>\n<h2><b>Methods for improving technology <\/b><\/h2>\n<p class=\"wls-paragraph\">The simplest software applications contain millions of lines of code. If even a tiny fraction of a percent of those lines contains error, this means there is a significant number of potential errors in every program or device.<\/p>\n<p><strong><span class=\"block_quote_right\">\u201cBecause every device and application has the potential to be a point of weakness in your network, some items carry more risk than others.\u201d<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p class=\"wls-paragraph\">While some of those mistakes will lead to simple crashes, some of them will be more serious and could allow someone to steal data or run malicious code. Some of those flaws could remain unpublished for years, in a way that might be used quietly for misdeeds, for quite some time.<\/p>\n<p class=\"wls-paragraph\">Because every device and application has the potential to be a point of weakness in your network, some items carry more risk than others. There are some devices that will necessarily be wholly under your control, and some that will be mostly outside your sphere of influence. But even the risk of relatively uncontrolled devices can be decreased:<\/p>\n<p class=\"wls-paragraph\"><strong>Update early and often<\/strong><\/p>\n<p class=\"wls-paragraph\">Most of us are aware of the necessity of regular software updates, at this point. But it\u2019s not just your desktop, laptop and mobile devices that need to be checked, and not all devices prompt you to let you know when new updates are available. <a href=\"https:\/\/www.welivesecurity.com\/2016\/11\/08\/secure-router-help-prevent-next-internet-takedown\/\" target=\"_blank\" rel=\"noopener noreferrer\">Routers<\/a> are another item that need to be updated, though you will likely need to manually check for when one is available.<\/p>\n<p class=\"wls-paragraph\"><strong>Network segmentation<\/strong><\/p>\n<p class=\"wls-paragraph\">Keep uncontrolled devices such as mobile devices or laptops brought by staff or students, and internet-connected \u201cSmart\u201d devices in areas of your network that are unconnected to areas where sensitive data resides; e.g. payroll information, healthcare records, and research data. Keep the sensitive areas of the network separate from each other, so that an attacker cannot use a less-secured device in your environment to get to a more valuable area.<\/p>\n<p class=\"wls-paragraph\"><strong>Principle of least privilege<\/strong><\/p>\n<p class=\"wls-paragraph\">Don\u2019t give any individual, system or part of your network any more access than is absolutely necessary to perform approved job functions. For example, you should carefully consider whether employees must have access to administrator-level access to their machines, or to areas of the network outside their own departments.<\/p>\n<p class=\"wls-paragraph\"><strong>Authentication and authorization<\/strong><\/p>\n<p class=\"wls-paragraph\">Use more than simple usernames and passwords to verify your users\u2019 identities, especially on machines with valuable or sensitive information. Two-factor authentication is now available on most online services, and can be easily added to your own login processes. Don\u2019t stop with merely <a href=\"https:\/\/www.welivesecurity.com\/2016\/02\/19\/four-account-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">verifying a user\u2019s identity<\/a>; couple this with the Principle of Least Privilege to assign what each user is authorized to access.<\/p>\n<p class=\"wls-paragraph\"><strong>Filtering network traffic<\/strong><\/p>\n<p class=\"wls-paragraph\">Use web and email filters that check for spam and phishing, as well as blocking popular file-types used by malware authors, as this can help decrease the risk of the malware reaching your users.<\/p>\n<p class=\"wls-paragraph\"><strong>Security software<\/strong><\/p>\n<p class=\"wls-paragraph\">Anti-malware software used on the gateway, network and endpoint can help identify and prevent malware from entering your network, or decrease damage done if it should succeed in getting past initial defenses. Firewalls and intrusion prevention software can help identify unknown or unwanted network traffic.<\/p>\n<p class=\"wls-paragraph\"><strong>Encryption<\/strong><\/p>\n<p class=\"wls-paragraph\">Sensitive data should be <a href=\"https:\/\/www.welivesecurity.com\/2014\/06\/10\/encryption-essential-for-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">encrypted<\/a> when it\u2019s stored on computers and mobile devices, and when it\u2019s sent across the network such as via email, web or instant messaging applications. This way, even if cybercriminals&nbsp;infiltrate your network, they may not be able to make off with your data.<\/p>\n<p class=\"wls-paragraph\"><strong>Prepare for emergencies<\/strong><\/p>\n<p class=\"wls-paragraph\">Backups that are performed and tested regularly are a very effective way to mitigate damage caused by ransomware and other malware as well as a variety of other types of <a href=\"https:\/\/www.welivesecurity.com\/2014\/05\/01\/business-continuity-management-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">technological or natural disasters<\/a>.<\/p>\n<h2><b>Methods for improving human factors<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"block_quote_right\">\u201cTechnology can help mitigate some risks, but if you\u2019re not addressing the people using your network, your hard work may be wasted.\u201d<\/span><\/strong><\/p>\n<p class=\"wls-paragraph\">Technological solutions can help mitigate some risks, but if you\u2019re not addressing the people using your network, your hard work may all be for naught.<\/p>\n<p class=\"wls-paragraph\">If security methods cause too much hassle, or if your users don\u2019t understand what constitutes safe computing behavior or why it\u2019s essential, they may thwart technological protections.<\/p>\n<p class=\"wls-paragraph\"><strong>Train early and often<\/strong><\/p>\n<p class=\"wls-paragraph\">You wouldn\u2019t explain the whole of geometry to a student once and then leave it at that. Likewise, it\u2019s important to give security lessons to your users in digestible chunks and then build on important concepts over time.<\/p>\n<p class=\"wls-paragraph\">With <a href=\"https:\/\/www.comptia.org\/resources\/trends-in-information-security-study\">research showing that 52% of data breaches is a result of user error<\/a>, it is important to make it mandatory for employees to take part in some sort of cyber education. If your IT budget is strapped, you can start with a free resource like <a href=\"https:\/\/www.eset.com\/us\/cybertraining\/?cmp=rfc-esetint-B2B2017-GenIT-textlink-PR\">ESET\u2019s Cybersecurity Awareness Training<\/a> that recently launched; it is completely free, and can easily be given to both staff and students.<\/p>\n<p class=\"wls-paragraph\">Regular testing can also be a great way to check the effectiveness of your training, to see what areas that need to be revisited. Have an <a href=\"https:\/\/library.educause.edu\/topics\/policy-and-law\/acceptable-and-responsible-use-policies\">Acceptable Use Policy<\/a> and make sure it\u2019s posted in places where users will see it often.<\/p>\n<p class=\"wls-paragraph\"><strong>See how users do their work<\/strong><\/p>\n<p class=\"wls-paragraph\">Security has gotten a bad reputation of being all about introducing impossible hurdles and of constantly looking over people\u2019s shoulders. By working with your users to see how they go about their daily tasks, you can tailor security measures to their needs so that they can enable users to safely do what they need to do. If done properly, it can even help users <i>strengthen<\/i> their privacy.<\/p>\n<p class=\"wls-paragraph\"><strong>Reward safer behavior<\/strong><\/p>\n<p class=\"wls-paragraph\">Users are the eyes and ears of your network. By enlisting their help to determine what is normal or anomalous behavior, and rewarding safer behavior, you can offer users more incentive to help improve your organization\u2019s security.<\/p>\n<p class=\"wls-paragraph\">Forbes recently published an article called <a href=\"https:\/\/www.forbes.com\/sites\/eycybersecurity\/2017\/03\/20\/why-cybersecurity-should-be-a-no-1-business-priority-for-2017\/#7ec3d6a91719\" target=\"_blank\" rel=\"noopener noreferrer\">Why Cybersecurity Should Be a No. 1 Business Priority For 2017<\/a>. I believe this is especially true for educational institutions. Schools are being hit with a wide variety of attacks; the dearth of data suggests that the effects of this are probably more severe and widespread than any of us realize. Now is the time to evaluate your security strategy and train employees, to protect our students and staff.<\/p>\n<p>&nbsp;<\/p>\n<p>Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/02\/schools-almost-dont-let-hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to security, schools have unique challenges. It\u2019s difficult to think of another type of organization that combines the functions of education, healthcare, finance, retail, and research, among the other usual administrative departments like human resources and accounting. When you couple this breadth of service with an alphabet soup of security compliance regulations,<\/p>\n","protected":false},"author":5,"featured_media":1916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>School\u2019s almost out \u2026 Don\u2019t let cybercriminals in - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in\" \/>\n<meta property=\"og:description\" content=\"When it comes to security, schools have unique challenges. It\u2019s difficult to think of another type of organization that combines the functions of education, healthcare, finance, retail, and research, among the other usual administrative departments like human resources and accounting. When you couple this breadth of service with an alphabet soup of security compliance regulations,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-08T15:18:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:01:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in\",\"datePublished\":\"2017-05-08T15:18:52+00:00\",\"dateModified\":\"2019-05-29T12:01:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/\"},\"wordCount\":1646,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_417515518-623x410.jpg\",\"articleSection\":[\"cybercrime\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/\",\"name\":\"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_417515518-623x410.jpg\",\"datePublished\":\"2017-05-08T15:18:52+00:00\",\"dateModified\":\"2019-05-29T12:01:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_417515518-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_417515518-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/schools-almost-out-dont-let-cybercriminals-in\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/","og_locale":"en_US","og_type":"article","og_title":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in","og_description":"When it comes to security, schools have unique challenges. It\u2019s difficult to think of another type of organization that combines the functions of education, healthcare, finance, retail, and research, among the other usual administrative departments like human resources and accounting. When you couple this breadth of service with an alphabet soup of security compliance regulations,","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-05-08T15:18:52+00:00","article_modified_time":"2019-05-29T12:01:41+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in","datePublished":"2017-05-08T15:18:52+00:00","dateModified":"2019-05-29T12:01:41+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/"},"wordCount":1646,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg","articleSection":["cybercrime"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/","name":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg","datePublished":"2017-05-08T15:18:52+00:00","dateModified":"2019-05-29T12:01:41+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_417515518-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"School\u2019s almost out \u2026 Don\u2019t let cybercriminals in"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/schools-almost-out-dont-let-cybercriminals-in\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1916"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}