Virginia Tech breach exposes data on 145K job applicants
University blames human error for compromise that exposed names, addresses, employment and education history
Computerworld - A Virginia Tech official Tuesday blamed human error for a data breach that may have exposed sensitive data on about 145,000 people who applied online for jobs at the school over the past 10 years.
The compromised data includes names, addresses, employment and education history -- and data on prior convictions. In the case of about 16,650 individuals, the compromised data includes driver's license numbers.
No Social Security Numbers or dates of birth were compromised in the incident, the university said in a statement Tuesday.
Lawrence Hincker, associate vice president for university relations at Virginia Tech today blamed the breach on a process failure.
"The server was placed in service without our normal cyber protection protocols," thereby allowing illegal access to the data, Hincker said in an email.
The university said the oversight allowed someone to illegally access the server and potentially the data it contained. "We became aware on Aug. 28 that it had been compromised," Hincker said without elaborating on how the university discovered the problem.
In many cases, such data compromises go unnoticed until the breached entity is notified by law enforcement, credit card companies or victims.
"Mitigation in this instance means ensuring that people with responsibility for placing equipment into service follow standard procedures," Hincker noted in his comments.
All victims whose drivers-license numbers were compromised have been notified of the breach, the university said.
Under Virginia law, driver's license numbers and employment data are considered protected financial information. Organizations that suffer a breach involving such data is required under state law to issue a public notification.
In recent years, literally hundreds of universities and millions of data records have been compromised due to what security analysts say are poor security practices. The number of data breaches involving universities and other institutes of higher education does appear to be declining though.
Statistics maintained by Privacy Rights Clearinghouse shows that through Sept. 24, there have been 29 breaches involving about 371,137 records at educational institutions around the country. In contrast, universities reported a total of 85 breaches involving over 1.7 million data records in 2012.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts