Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » 4 Account Takeover Risks for District Cloud Apps

4 Account Takeover Risks for District Cloud Apps

by Katie Fritchen on November 21, 2019

School districts using G Suite and Office 365 must protect themselves from account takeovers

The number of account takeovers is rising, along with the damage they cause. School districts are particularly vulnerable to account takeover risks for a couple of reasons.

First, school districts are on the leading edge of adopting cloud computing and realizing the benefits of using applications like G Suite and Office 365. Unfortunately, district IT teams are not on the leading edge of cloud computing security. Many still mistakenly think that their firewall, MTA, and Google/Microsoft has their cloud environments protected.

Second, school district IT teams are notoriously underfunded and overwhelmed. With a relatively low IT to building staff/student ratio, your team is constantly being pulled in multiple directions, putting out all kinds of different fires. Often, cybersecurity resilience falls to the wayside because it gets little visibility or consideration from stakeholders. Until something happens.

Without the right safeguards, account takeovers are almost impossible to detect before they create chaos for school districts. And, cloud account takeover activity is on the rise. As of 2018, the number of documented and reported account takeovers increased by 79% over 2017.

[FREE CHECKLIST] G Suite & Office 365 Security Settings Checklist – Make Sure Your Security Settings Are Properly Configured >>

What is an Account Takeover?

In simple terms, an account takeover happens when a criminal obtains unauthorized access to one of a user’s online accounts. This access allows them to use it for some type of personal gain—typically financial.

Access to several types of personal online accounts can be stolen. These include an email account, bank account, or social media account. Often, access to one type of account leads to access to other types of accounts. In the school district environment, it can also lead to access to additional user accounts. Acting as the individual whose account they’ve hacked, criminals can send phishing emails, steal funds, make fraudulent purchases, and steal personally identifiable information, and harm the individual’s reputation using their social media accounts.

In a setting such as a school district’s, the criminal can takeover accounts that allows them access to many types of accounts including student records, school bank accounts, employee information and W2s, and administrative applications such as accounts payable.

A district must safeguard their organization’s data, including that of all the students who attend their schools. Therefore, schools need to be doubly careful about controlling account takeover risks.

4 Common Account Takeover Risks

Account takeover prevention starts with education because your employees and students can allow an account takeover without realizing it. You can also help reduce risks with relatively simple cybersecurity solutions.

1. Human Error

The most common way that hackers get control over an account is because of human error. And, the most common way this happens is when someone clicks on a link or opens an attachment in a phishing email. It’s critical that you conduct ongoing cybersecurity training to explain the consequences of ignoring good cybersecurity practices. Teach people how to spot a phishing email, and send regular updates as a reminder to remain vigilant.

Include education about lateral phishing emails; they’re one of the most dangerous types of phishing emails. Let’s assume that a teacher opened an attachment on a phishing email, and a hacker gained control over that email account. The hacker would then send lateral phishing emails to everyone on the teacher’s contact list. When other employees or students receive the email, their guard is down because they think someone they know sent them the email.

2. Weak Passwords

The UK’s National Cyber Security Center conducted a worldwide survey to identify the most common passwords that have been hacked in global cyber breaches. The most common password was “123456,” which is being used by 23.2 million people. As you can see, without proper education, many people are unaware of how critical it is to use strong passwords.
You can help fight weak passwords by creating password strength policies. Setting up 2-factor authentication features on your systems is an even more powerful safeguard you can use for account takeover protection.

If you use G Suite or Office 365, the vendors already offer some excellent security features. Make sure you’re using those security features correctly by using our Cloud Application Security Checklist.

3. Risky EdTech

The number of EdTech SaaS applications that are available to teachers, students, and staff is growing. Many teachers access these applications using OAuth, which connects the app to district Google and/or Microsoft environments. You need to understand OAuth risks and solutions in order to combat the problems that risky EdTech presents.

In addition, account takeovers are only one of the consequences of using risky EdTech. This makes your task of protecting district information systems even more of a challenge. Managing EdTech security risks must be a key part of your cybersecurity plans. You need to include:

  • 24/7 activity monitoring
  • Automatic action when a malicious app is discovered
  • Updating your cloud safety measures
  • Publishing an EdTech policy manual

4. Lack of Control Over Cloud Apps

Many people believe that they can completely protect cloud apps using firewalls and secure web gateways. They also believe that a Message Transfer Agent (MTA) will protect their cloud email apps, like Gmail and Outlook 365. Unfortunately, neither of those beliefs is true.

Cloud account takeovers don’t happen because of attacks that firewalls can stop. And they are notoriously difficult to detect. IT staff needs to be able to see the activity within their cloud apps. Without that type of visibility, account takeovers can happen and quickly spread throughout the organization right under their noses.

A cloud security audit for your district’s G Suite and/or Office 365 environment is the best way to determine where your cloud account takeover vulnerabilities exist. Further, monitoring for account takeover risks 24/7 is the best way to detect account takeover attempts and prevent them. Given the number of risks you face just for account takeovers, you’ll sleep better at night if you know that you’re doing everything you can to protect your schools, students, and staff.

K-12 Cloud Security Risks Checklist

The post 4 Account Takeover Risks for District Cloud Apps appeared first on ManagedMethods.


Recent Articles By Author
  • NIST Cybersecurity Recover Function for K-12
  • How To Get Started With The NIST Cybersecurity Respond Function
  • NIST Cybersecurity Detect Function for K-12
More from Katie Fritchen

*** This is a Security Bloggers Network syndicated blog from ManagedMethods authored by Katie Fritchen. Read the original post at: https://managedmethods.com/blog/account-takeover-risks-for-district-cloud-apps/

November 21, 2019November 21, 2019 Katie Fritchen account takeover, education, Google G Suite, K-12 Cloud Risks, Microsoft Office 365
  • ← Key Take-aways from Gartner’s Technology Insight for Software Composition Analysis Report
  • Phantom Incident Scam Threatens Release of Corporate PII →

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
U.S. Election Security (and Insecurities)
Drupal Core: Behind the Vulnerability
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 2 days ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 3 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 4 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Security Humor

via  the comic delivery system monikered  Randall Munroe  resident at   XKCD  !

XKCD ‘Contiguous 41 States’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.