Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Texas SB 820 Advances K-12 Cybersecurity Despite Limitations
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

Texas SB 820 Advances K-12 Cybersecurity Despite Limitations

4 years ago Ben Jackman
Texas SB 820 Advances K-12 Cybersecurity Despite Limitations

Like many organizations, K-12 schools adapted to COVID-19 by accelerating their digital transformation journeys. And like everyone else who followed this path, they invited unwanted attention from digital criminals in the process.

In December 2020, for instance, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued a joint alert with the FBI and MS-ISAC warning of malicious actors targeting school computer systems to disrupt distance learning with digital threats such as ransomware. More than half (57%) of ransomware attacks reported to MS-ISAC in August and September 2020 involved K-12 schools, as noted by CISA. By comparison, just 28% of reported ransomware incidents from January through July targeted schools.

Those ransomware attacks didn’t just disrupt access to schools’ computer systems. Threat actors also sometimes used their malware payloads to steal confidential student data. Per Yahoo Finance, nine percent of parents said that their school had suffered a ransomware infection while their child was a student there. Of those respondents, 61% indicated that malicious actors had compromised their child’s data during the infection.

It’s therefore no surprise that some school districts have reported a dramatic increase in their cyber insurance premiums. Bleeping Computer reported that one school district in Illinois saw its policy renewal costs jump from $6,661 in 2021 to $22,229 a year later. This reflects the growing number and severity of threats confronting K-12 schools (as well as other organizations in general) along with the elevated potential for costly disruptions.

Government Steps in to Help

In response to the trends discussed above, governmental agencies at all levels have taken action to help schools to strengthen their cybersecurity measures. At the federal level, for instance, U.S. President Joe Biden signed the K-12 Cybersecurity Act to help schools across the country better protect sensitive information. Simultaneously, there have been a variety of efforts at the individual State level. Let’s examine one initiative in particular: Texas’ Senate Bill (SB) 820.

Overview of Texas SB 820

SB 820 requires each school district in Texas to adopt a cybersecurity policy that helps them to defend their computer systems against security incidents and to evaluate their cybersecurity risks for the purpose of mitigation planning. The policy must also not conflict with other information security standards adopted by the State’s Department of Information Resources (DIR). Those standards include the Texas Cybersecurity Framework (TCF). Modeled off the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), TCF uses self-assessments to help organizations measure their security maturity across 42 control objectives that apply to one of the five following security functions: Identify, Protect, Detect, Respond, and Recover.

Once they have a cybersecurity policy in place, the superintendent of each Texas school district needs to appoint a cybersecurity coordinator who shall serve as a liaison between the school district and Texas agencies. In this role, the cybersecurity coordinator will be responsible for reporting security incidents to the State government as soon as they can following discovery. The cybersecurity coordinator will also be charged with notifying parents and guardians of instances where malicious actors compromise their students’ information and explaining what school officials are doing to protect that data going forward.

On May 22, 2019, the Texas State House of Representatives passed SB 820 with amendments. The body went on to say that the Act would take effect on September 1, 2019.

Analysis

In its form outlined above, Texas SB 820 is a step in the right direction. But there are two potential drawbacks that are worth pointing out. First, it could be challenging to perform (and track) the self-assessment for large school districts because each school or each department might have different maturity levels in each of the 40 requirements. That doesn’t even account for the bias that sometimes comes with self-assessments.

Second, in complying with the TCF, SB 820 requires school districts to rely on self-assessments along with a single maturity rating based on their overall percentage per each of the 40+ requirements. This design might cause cybersecurity teams to miss glaring holes. Cybersecurity is not about “overall percentages,” after all. It’s about the weakest links. Attackers will find an organization’s most vulnerable and softest spots, and they’ll enter from there. It doesn’t matter if 90% of an organization has achieved maturity Level 5 of the third requirement, “Critical Information Asset Inventory,” for instance. If they can’t identify and inventory 10% of their organization’s networks, then that is a major issue.

Part of a Larger Trend?

It’s possible that smaller government entities taking portions of the NIST CSF will become a trend going forward. Acknowledging this possibility, organizations need to get more strategic about their security programs by focusing on NIST CSF and other well-known cybersecurity standards. That’s where Tripwire comes in. Tripwire has thousands of pre-written policies for compliance testing to NIST CSF, the CIS Controls, NERC-CIP, and others. Its platform makes it easy for customers to pick and choose from multiple cybersecurity policies to create their own. With reference to SB 820 specifically, Tripwire can build a Texas Cybersecurity Framework policy to help a school district automatically track and record its security controls rather than rely on self-assessments. This would help them create different zones or departments and record the maturity ratings individually to build tailor-made roadmaps and identify their weakest links.

Learn more about how Tripwire can help you to comply with the Texas Cybersecurity Framework.

The post ” Texas SB 820 Advances K-12 Cybersecurity Despite Limitations” appeared first on TripWire

Source:TripWire – Ben Jackman

Tags: COVID-19, Critical Severity, Goverment, Malware, Ransomware, TripWire

Continue Reading

Previous Russia Issues Its Own TLS Certs
Next Healthcare Providers Need to Increase Budgets for Cybersecurity

More Stories

  • Cyber Attacks
  • Data Breach

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

17 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

1 day ago [email protected] (The Hacker News)

Recent Posts

  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
  • The Kill Chain Is Obsolete When Your AI Agent Is the Threat
  • Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
  • Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT