System vulnerability at Conn. state university may have exposed student data
Western Connecticut State University does not believe the records of 233,880 people were inappropriately accessed
IDG News Service - Western Connecticut State University said Thursday that a vulnerability in its computer system present for more than three years may have exposed the data of 233,880 students and other people affiliated with the institution.
The vulnerability has now been fixed, and it is not believed that the system was inappropriately accessed, the university said. The data exposed included names, addresses, Social Security numbers and financial account information supplied by prospective students when applying to the university as well as lists of SAT scores bought by the school. The university said buying test scores is a common practice in higher education.
"Since discovery of the exposure, the university has dramatically increased its information protection capacity with new layers of protection," the school said. "The university will continue to assess and improve all aspects of its information security."
The information exposed dated back to 1999. The vulnerability was present in the system between April 2009 through September this year. The university did not describe the vulnerability in its news release.
WCSU is offering two years of credit monitoring to those affected from the company AllClear ID. A It has also set up a web-based form where people can enter their last name and the last four digits of their Social Security number to see if their data was exposed.
The university notified the office of the Attorney General Connecticut of the problem.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts