Skip to playerSkip to main content
  • 18 hours ago
Transcript
00:00UK students treat hacking school systems as a game, warns ICO.
00:05Kids in the UK aren't just sneaking extra snacks into their backpacks, they're sneaking
00:09into their school's computer systems.
00:12The Information Commissioner's Office found students behind 57% of school data breaches,
00:17often using low-tech methods.
00:19About a third involved guessing passwords or finding login details.
00:23Students occasionally showed hacker skills.
00:26In one case, three-year-eleven students gained unauthorized access to the school's information
00:32system by repeatedly guessing passwords and bypassing security measures.
00:37Two of them frequented a hacking forum sharpening their cyber skills.
00:41The ICO warns that today's classroom antics could evolve into future ransomware attacks
00:46on vital infrastructure.
00:48Heather Toomey, Principal Cyber Specialist at the ICO, put it bluntly.
00:52What starts out as a dare, a challenge, a bit of fun in a school setting, can ultimately
00:57lead to children taking part in damaging attacks.
01:00Today's detention is tomorrow's FBI watchlist.
01:04The breaches weren't all kids' fault, though.
01:07About a quarter stemmed from teachers letting students borrow their devices, 20% came from
01:12staff mixing personal and professional devices, and another 17% happened because of sloppy access
01:18controls on platforms like SharePoint.
01:20Basically, weak security gave students an open invitation to snoop around.
01:26The ICO urged schools to bolster GDPR training and cybersecurity practices and report breaches
01:32promptly.
01:33Because while students might think hacking into the system is just a bit of fun, regulators
01:38are quick to point out it's also a bit illegal.
01:50Maybe we'll be able to say about it.
01:51Maybe we'll be able to find a way of planning, whether it's possible or highlighting it.
01:56But please, then, if we're pushing all the instructions on this, we're pushing all the
02:01part of the cycle, of the time that we're missing the resources of the network which we're
02:05using, and we'll see the information that we're using the resources that we're using at the
02:06point of the navigation.
02:07This is just a great question.
Be the first to comment
Add your comment

Recommended

2:16
Up next
2:25