Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Right to reply: UK schools ‘a playground for hackers’

January 10, 2011

Many primary and secondary schools in the UK are thought to be highly vulnerable to cyber attacks as a result of poor software patching and a lack of wider information security provision – putting pupil, employee and administrative information at risk – according to security testing specialist NGS Secure, part of NCC Group.

NGS Secure recently audited one selected UK secondary school and primary school – neither of which can be named due to confidentiality agreements – to ascertain how secure each was as part of a project to boost security within a local education authority.
At the high school, NGS Secure scanned 338 computers in total, unearthing over 9,000 instances of missing critical software patches and multiple instances of outdated or missing anti-virus software. These flaws would allow an attacker or virus to trivially exploit the systems without any prior knowledge of the target. In some instances, systems holding databases were found to be vulnerable to attack, which would allow a hacker complete access to information contained within those databases.
NGS Secure found that devices on the secondary school’s network were protected by easily guessable passwords, such as ‘private’ or ‘password’, which could allow anyone to enter the systems and change their configurations. Multiple users were also found to have access to the ‘administrator’ group on the network, one of which is a backup account with a default and widely known password. This could allow a hacker administrator access, rendering the school’s entire network vulnerable to attack.
At the primary school, 20 of 44 computers tested had critical security flaws, including missing updates for differing versions of software in use, missing or outdated anti-virus software and multiple users located within the ‘administrator’ group. Various non-standard software packages were also found to be in use at the primary school, including Microsoft Windows Messenger, Real Player, Adobe Reader and Apple iTunes, suggesting that individuals were importing files from home computers, thus presenting the risk of virus infection.
Paul Vlissidis, technical director at NGS Secure, said: “It is widely thought that UK schools are, for the most part, behind other public sector organisations when it comes to information security. The two tests we carried out do nothing to dispel this perception.
“The schools in question displayed missing patching – some of which was 15 years out of date – as well as firewalls and anti-virus security provision that was totally ineffective. Even the basics of logical security, such as complex password protection and limiting administrator access, were not being followed.
“We believe our research to be indicative of similar issues in many UK comprehensive and primary schools, where networks are open to trivial attacks by even the most amateur hackers. This is highly concerning considering the amount of personal information on staff members and pupils these networks contain. While an attack on a school network may seem like a trivial matter as no financial data is likely to be obtained, a miscreant could potentially access thousands of children’s personal information – where they live, next of kin and telephone numbers. In the wrong hands, this information could be highly dangerous.
“The most likely hackers, however, are the pupils themselves. Many understand simple techniques to gain access to networks, be it via brute force attacks or social engineering, and are likely to be driven by in-school grievances.”
Vlissidis pointed to the lack of awareness of IT security risks amongst staff as one of the reasons for poor assurance provision, and outlined that many schools viewed limited financial resources to be better spent elsewhere. He commented: “Teachers are generally unaware of the logical security vulnerabilities in their schools. As a result, no one takes responsibility for it. Information technology teachers may pick up this responsibility, but few have the time or the specialist skills to ensure a school network is completely secure. Schools are also unlikely to bring in an external tester on a regular basis to ensure security, simply because the cost is too great and the availability of equipment is viewed to outweigh the need for security.
“Schools need to be aware that public sector organisations are not exempt from ICO fines and that a serious breach could be costly to local education authorities.”
Source: www.nccgroup.com

Uncategorized Apple, local, Microsoft, security, technology

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT