Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 04 October 2022 / Published in Woo on Tech

LAUSD Hackers make good on threat, release data

The Los Angeles United School District (LAUSD) was hacked in early September, prompting a near total shutdown of school network systems during the week following Labor Day while law enforcement and the district worked to recover and clear systems of possible backdoors and tripwires, of which many were found. The nation’s second largest school district is one of over two dozen US school districts to be attacked this year, and as you can imagine, the hackers are counting on the threat of releasing student data to provide enough pressure to convince administrators to pay the ransom. While at least 2 of the attacked school districts have indeed capitulated to ransom demands, the LAUSD did not, and the hackers made good on their promise to release the data, which happened this past weekend.

What this means for you

According to a recent report from LAUSD officials, the 500 GBs of data leaked contained a fairly limited amount of truly sensitive data. There were concerns that very sensitive information, such as student psychological evaluations, might be a part of the data stolen, but apparently not. Regardless of the data contents, or how quickly they were able to restore service, this isn’t a good look for the LAUSD especially since so many parents entrust their child’s safety and privacy to the district. Nor would it be a good look for any company, big or small, even if they were able to ignore hacker demands and rely on data backups to bring operations back online. If any confidential customer data was leaked, depending on the type and number of records, the hacked organization might be legally obligated to notified those customers. If that company relied on insurance claims to help recover from a cyberattack, they will most certainly be scrutinized by their insurance company, as well as a third-party audit firm, and again, possibly by law enforcement if the affected database is large enough or contains certain protected information. Being able to recover from an attack is an absolute necessity you should be planning for, but preventing the attacks should be even higher priority, don’t you think? On top of having multiple layers of technical protection around your email services, office networks and remote worker computers, everyone should be trained on how to protect themselves by understanding how to spot potential phishing and social engineering attacks, and this requires systematic training, testing and tracking.

Image by Pete Linforth from Pixabay

  • Tweet

What you can read next

On the clearance rack: one very (ab)used dotcom
Internet_Explorer_7_Logo[1].png
Zero-Day IE Vulnerability Patched by MS
Two for Tuesday Part 2: More Malfeasance, Misuse and Morons

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Social security cards

    The Government Might Have to Reissue Every Social Security Number in America. What Does That Mean for Your Business?

    Two years ago, that sentence would have sounded...
  • Accountant working on accounting software on laptop

    What Accounting Firms Learn About Technology During Tax Season

    Tax season is the best stress test your technol...
  • Someone working on a tablet with AI

    Your Employees Are Already Using AI With Your Client Data

    You just don’t know it yet. I had a conve...
  • 3-2-1 countdown over computer language background

    The 3-2-1 Backup Rule Explained for Non-Technical Business Owners

    The 3-2-1 backup rule is one of those things th...
  • Microsoft365 vs Google

    Microsoft 365 vs. Google Workspace: Which One Actually Works for Law Firms?

    Many businesses, when trying to get their proce...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP