Quick Overview
Educational institutions are increasingly vulnerable to cyber threats. Schools manage vast amounts of personal information across a broad digital landscape. While schools are considered high profile entities where reputational risk is severe, they face significant funding challenges, limiting their ability to invest in cybersecurity infrastructure and personnel.
To view the webinar recording, click here (passcode: .+V0GxdH).
Threat Landscape
How are Schools Being Targeted?
Figure out which threats pose the most risk to your specific institution.
- Vendors
- Phishing
- Remote desktop protocol
- Open ports
- End of life software
- Social engineering
Cyber Attack Statistics
- The education sector experienced 1,780 cyber incidents in 2024, with 1,537 confirming data disclosure.
- The average cost of a data breach for educational institutions in 2024 was $3.5 million.
- Education ranks among the top sectors where backups often fail during cyber incidents. Reliable backups are essential for effective recovery and continuity.
Cyber Claim Life Cycle
The cyber claim process begins with the discovery of an incident, followed by immediate incident response and notification to the insurance carrier. A point of contact is assigned, and approved vendors are selected in coordination with the insurer. Within hours, an initial scoping call is held to assess the situation, after which breach counsel is engaged to guide the response and coordinate containment efforts with internal and external stakeholders.
Be mindful of experience, insurer panel status, response time and data handling practices when selecting vendors. It’s important to address pitfalls in the claims process, like delays in reporting, use of non-approved vendors or lack of documentation.
Role of Breach Counsel
- Establishes attorney client privilege
- Provides legal guidance throughout the course of an incident
- Coordinates panel vendor approvals with insurance carrier
- Leads initial scoping call and engages forensic provider
- Offers institutional knowledge
Cybersecurity
With an ever-growing number of security controls available, knowing where to focus your efforts is essential. Implementing the right controls strategically is key for effective cybersecurity. Controls can include employee training, multi-factor authentication, endpoint detection response and secure backups. While these controls are foundational, proactive preparation is just as important to minimize the impact of an incident and accelerate recovery.
Cyber Insurance
Make your policy work for you. It’s not just about having coverage—it’s about understanding how to use it effectively. Know who your panel providers are and what resources are available to you before an incident occurs. Cyber insurance policies provide:
- Promotion of overall security and hygiene
- Risk transfer and financial protection
- Expedited access to professional service providers
- Value added risk management services
Passcode: .+V0GxdH
Meet the Presenters
Valentino Papa, CPCU, ARM, AINS
Client Executive / Cyber Practice Leader
Jennifer Beckage
Managing Director, The Beckage Firm
Scott Morris
SVP, Technology & Security, The Beckage Firm
Hunter Maskill
Executive Vice President, INSUREtrust