Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label education sector. Show all posts

AI Transforming Education in the South East: A New Era for Schools

 


Artificial Intelligence (AI) is increasingly shaping the future of education in the South East, moving beyond its initial role as a tool for students to assist with essay writing. Schools are now integrating AI into their administrative and teaching practices, heralding a significant shift in education delivery.

Cottesmore School in West Sussex has pioneered the use of AI by appointing an AI headteacher to work alongside a human head teacher Tom Rogerson. This AI entity serves as a "co-pilot," providing advice on supporting teachers and staff and addressing the needs of students with additional requirements. Mr. Rogerson views the AI as a valuable sounding board for clarifying thoughts and offering guidance.

In addition to administrative support, Cottesmore School has embraced AI to create custom tutors designed by students. These AI tutors can answer questions when teachers are not immediately accessible, offering a personalised learning experience.

The "My Future School" project at Cottesmore allows children to envision and design their ideal educational environment with the help of AI. This initiative not only fosters creativity but also familiarises students with the potential of AI in shaping their learning experiences.

At Turner Schools in Folkestone, Kent, AI has been incorporated into lessons to teach students responsible usage. This educational approach ensures that students are not only consumers of AI technology but also understand its ethical implications.

Future Prospects of AI in Education

Dr. Chris Trace, head of digital learning at the University of Surrey, emphasises that AI is here to stay and will continue to evolve rapidly. He predicts that future workplaces will require proficiency in using AI, making it an essential skill for students to acquire.

Dr. Trace also envisions AI tracking student progress, and identifying strengths and areas needing improvement. This data-driven approach could lead to more individualised and efficient education, significantly enhancing learning outcomes.

Tom Rogerson echoes this sentiment, believing AI will revolutionise education by providing personalised and efficient teaching methods. However, he underscores the importance of maintaining human teachers' presence to ensure a balanced approach.


Despite the promising potential of AI, there are major concerns that need addressing. Rogerson highlights the necessity of not humanising AI too much and treating it as the tool it is. Ethical use and understanding AI’s limitations are crucial components of this integration.


Nationally, plagiarism facilitated by AI is a prominent issue. Dr. Trace notes that much initial work on AI in education focused on preventing cheating. Cerys Walker, digital provision leader at Turner Schools, points out the difficulty in detecting AI-generated work, as it often appears very natural. She also raises concerns about unequal access to technology at home, which could exacerbate existing disadvantages among students.


Walker stresses the responsibility of schools to educate students on the ethical use of AI, acknowledging both its advantages and potential drawbacks. The Department for Education echoes this, emphasising the need to understand both the opportunities and risks associated with AI to fully realise its potential.


AI is set to transform education in the South East, offering innovative ways to support teachers and enhance student learning.  

South St. Paul Public Schools Grapple with Ongoing Tech Disruption

 

South St. Paul Public Schools recently alerted families to ongoing technology disruption, shedding light on potential disruptions to online platforms, emails, and other digital services. In a note on Monday, the district acknowledged technical difficulties and later revealed the presence of "unauthorized activity" within its computer network. 

Upon discovering the unusual activity, the district swiftly took its systems offline to isolate the issue. To address the situation comprehensively, South St. Paul Public Schools enlisted the assistance of a third-party cybersecurity firm. This partnership aims not only to recover systems but also to investigate the cause and scope of the unauthorized activity. 

The district actively focuses on restoring all systems, emphasizing the importance of maintaining a productive learning environment for students and staff. Acknowledging the inevitability of cyber threats in today's interconnected world, South St. Paul Public Schools reassured families that proactive steps had been taken to create a secure online environment. 

This incident adds to a series of cybersecurity challenges faced by educational institutions in the region. In a previous case, the St. Paul school district notified over 43,000 families about a "data security incident" in February 2023. Fortunately, only student names and email addresses were compromised in the unauthorized access. 

The University of Minnesota also grappled with a data breach last year, exposing personal information spanning 30 years, from 1989 to August 2021. The breach targeted names, addresses, phone numbers, Social Security numbers, driver’s licenses, and passport information. Minneapolis Public Schools faced a ransomware attack in the same year, exposing confidential student documents online. 

The refusal to pay a $1 million ransom led to the compromise of sensitive data, including sexual assault cases, medical records, and discrimination complaints. South St. Paul Public Schools' proactive approach to addressing the ongoing technology disruption showcases the importance of swift action and collaboration with cybersecurity experts. 

As educational institutions continue to face digital threats, it becomes imperative for them to prioritize robust security measures, ongoing vigilance, and prompt response strategies. In an era where technology is deeply integrated into the educational landscape, the South St. Paul incident serves as a reminder of the ever-present challenges in safeguarding digital infrastructures. Educational institutions must remain vigilant, continually adapting to the evolving threat landscape to ensure a secure and uninterrupted learning experience for students and staff.

Bl00dy Ransomware Targets Education Orgs via PaperCut Flaw

The Federal Bureau of Investigation (FBI) has issued a warning about the Bl00dy ransomware gang targeting educational organizations through vulnerabilities in the popular print management software, PaperCut. The cybercriminals are exploiting a critical flaw in PaperCut to gain unauthorized access and launch ransomware attacks, posing a significant threat to the education sector.

The Bl00dy ransomware gang has been actively targeting schools and other educational institutions, taking advantage of the vulnerabilities in PaperCut's software. By exploiting this flaw, the attackers can gain unauthorized access to the system and deploy ransomware, encrypting critical files and demanding a ransom for their release.

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have urged educational organizations to take immediate action to address this vulnerability and strengthen their security measures. It is crucial for educational institutions to promptly update and patch their PaperCut installations to protect against potential attacks.

The Bl00dy ransomware gang's targeting of the education sector is particularly concerning as schools and colleges hold sensitive data, including student records and financial information. The impact of a successful ransomware attack can be severe, leading to significant disruptions in educational services and potential data breaches.

To defend against such attacks, educational organizations must adopt a multi-layered approach to cybersecurity. This includes regularly updating and patching software and systems, implementing robust network security measures, and conducting regular backups of critical data. Additionally, user awareness training can help educate staff and students about potential threats and how to avoid falling victim to social engineering tactics.

The FBI and CISA have emphasized the importance of reporting any suspected or confirmed cyberattacks to law enforcement agencies promptly. Timely reporting can assist authorities in tracking and apprehending cybercriminals, while also providing valuable intelligence to help prevent future attacks.

The PaperCut vulnerability was used by the Bl00dy ransomware gang to extort money, underscoring the constantly changing nature of cyber threats and the necessity for ongoing monitoring. Prioritizing cybersecurity measures is essential as businesses continue to rely on digital systems and services to protect sensitive information and ensure smooth operations.

In order to effectively address risks and adopt cybersecurity measures, educational institutions must be proactive. The education sector may reduce the chance of falling victim to ransomware attacks and safeguard the integrity of their systems and data by being watchful, updating software, and working with law enforcement organizations.



 Tennessee State University was Targeted by a Cyber Attack

 

Officials say a data security breach at a Tennessee community college might just have resulted in a sensitive data breach of previous and present students, instructors, and employees. 

In 2021, educational institutions are expected to experience a record number of ransomware attacks, with K-12 schools being the top targets. Productive one-device-per-student and learn-from-anywhere programs have increased the attack surface for numerous cyber risks while improving educational achievements. 

Ransomware is a type of destructive software created by coordinated cybercriminals, often known as "bad actors, "A hacker employs software, which is generally transmitted via phishing emails, to encrypt or prevent access to information systems and documents in a ransomware assault. The victim is told that the only option to regain access is to pay a ransom or a set amount of money.

Officials say a data security breach at a Tennessee community college might just have resulted in unauthorized private data of previous and present students, instructors, and employees being breached. The Tennessee Board of Regents said in a press release, “Pellissippi State Community College is issuing out notices regarding a ransomware attack aimed primarily at encrypting school data in order to extort a ransom payment.” According to the Knoxville college's website, Pellissippi State did not pay a ransom. 

According to the board, which governs the state's community colleges, the college's core database and online payment systems have not been infected, and no data from such networks was accessed by unauthorized individuals. Officials believe a data leak at a Tennessee community college may have exposed the personal information of former and current students, professors, and workers to the public. 

Schools have become increasingly subject to security concerns and potential assaults as a result of the buzz of new technology required to enable the move to remote learning as a reaction to the growing health issue. 

New applications, patching delays, and security measures falling short of mark have added complexity and risks to situations where security had previously been a last-minute consideration. These flaws constitute a serious risk if they are exploited. 

As per the experts, absolute research is significant because it evaluates how virtual learning disruption, particularly new technology adoption, has enabled new attack avenues for bad actors and hackers.

The GootLoader Hackers are After Law Firms and Accounting Firms

 

GootLoader is a piece of initial access malware that allows its operators to install a variety of other malware families, including ransomware, on affected devices. It was first discovered in December 2020. The GootLoader hacking organization has been primarily targeting personnel at law and accounting firms in recent weeks, with the most recent attack occurring on January 6. So far, eSentire claims to have intercepted three such assaults. Potential victims are directed to hacked genuine websites that include hundreds of pages of business-related content, including free document samples for download, but they are instead infected with GootLoader. 

GootLoader is distributed using Drive-By-Download programmes, which are driven by SEO, specifically through Google. The hackers are enticing business professionals to authentic but compromised websites that they have packed with hundreds of pages of content, including multiple connections to business agreements, including legal and financial agreements, in these recent attacks.
 
The content claims to provide free downloads of these documents. eSentire's Threat Response Unit (TRU) discovered that the GootLoader hackers set up over 100,000 malicious webpages marketing various forms of commercial deals during an intensive GootLoader campaign that began last December. 

How are the GootLoader threat actors able to infiltrate reputable websites with hundreds of pages of malicious content? 

Tragically, it is just too simple. Hundreds of legitimate websites employing WordPress as the content management system have been detected by the GootLoader gang. WordPress, like many other content management systems, has several vulnerabilities, which hackers may simply exploit to load websites with as many harmful pages as all without the knowledge of the website owner. These websites, according to the TRU team, encompass a wide spectrum of industries, including hotel, high-end retail, education, healthcare, music, and visual arts. 

"The abundance of content that threat actors have pushed onto the web, when professional looks for a sample business agreement on Google, the hackers' malicious web pages appear in the top Google searches," said Keegan Keplinger, TRU's research and reporting lead. 

Three law businesses and an accounting firm were targeted by the cybersecurity services provider, which said it intercepted and demolished the attacks and the victims' identities have not been revealed. Organizations should implement a vetting process for business agreement samples, train staff to open documents only from reputable sources, and confirm that the content downloaded matches the content intended for download.

Ransomware Attacks Targeting UK’s Education Sector Increased, says NCSC

 

According to the warning by GCHQ's cybersecurity arm, NCSC, there has been a substantial spike in the number of ransomware attacks targeting the education sector over the last month, just as schools were getting ready to resume in-person classes. 

Ransomware attacks on the UK education sector have been on the rise, according to a new report. This includes developments seen in August and September 2020, along with attacks that have occurred since February 2021. It also offers mitigation recommendations to help in the defense of this sector. 

According to the report, senior leaders must recognize the magnitude of the threat and the ability of the ransomware to cause serious harm to their organizations in terms of information exposure and access to important services. 

Ransomware encrypts servers and files, making it impossible for businesses to provide services. Cybercriminals are anticipating that the need for schools and colleges to provide instruction would lead to target organizations succumbing to extortion requests and paying a bitcoin ransom in return for the decryption key required to recover the network. More importantly, cybercriminals have begun to warn that if the ransom is not paid, they will disclose confidential data taken from the network during the attack. Many elevated cases have arisen in which cybercriminals have carried out their attacks by exposing confidential data to the public, mostly via the darknet's “name and shame” websites. 

"In recent incidents affecting the education sector, ransomware has led to the loss of student coursework, school financial records, as well as data relating to COVID-19 testing," the agency said. 

Ransomware attacks can be crippling to businesses, taking a considerable period for victims to recover and restore vital services. These activities can also be high-profile in nature, gaining a lot of attention from the public and the media. 

There are many ways for ransomware attackers to gain entry to a victim's network. Remote Desktop Protocol (RDP) is one of the most commonly used protocols for remote desktop activities, according to the NCSC, allowing staff to access their office desktop computers or servers from a remote device over the internet. Ransomware attackers often use insecure RDP and virtual private networks (VPN) configurations to gain initial access to victims' computers. 

"This is a growing threat and we strongly encourage schools, colleges, and universities to act on our guidance and help ensure their students can continue their education uninterrupted", says NCSC. 

To protect against malware and ransomware threats, the NCSC suggests that businesses must adopt a "defense in depth" technique. Having an effective plan for vulnerability management and deploying security fixes, protecting remote web services with multi-factor encryption, and installing and activating anti-virus programs are all cybersecurity guidelines for schools, colleges, and universities to secure their networks from ransomware attacks.