‘Tis The Season for The Gift That Keeps on Taking

Bill Balint • December 6, 2024

‘Tis the season for hustling and bustling, while also (hopefully) watching the bottom line along with the inevitable waiting lines at the checkout.


For those in education writing ‘the big checks’ – perhaps with careers in addition to dollars – the costliest lump of coal in the stocking might just be a data breach at their institution.


What those of us in the industry hear and read on the financial side of data breaches is downright scary and even stretch the bounds of legitimacy. Counting on Mr. Scrooge to help with a donation is not an ideal strategy!


Questions like the following seem to be on the rise, including “Are these numbers real or just a scare tactic from the cybersecurity sector?”, “How do these so-called experts really know what it costs?”, “What happens if the institution simply cannot afford the cost?”, and “These numbers cannot be correct for education where we are not some huge corporation with industry trade secrets and/or stockholders?”


Unfortunately, cyberattacks are ‘celebrating’ their 25th anniversary depending upon which historical reference is used, and it is a gift that keeps on taking with no end in sight.


First, it is unfortunate that a few institutions have paid the ultimate price, as did current and potentially future students either losing the gift of higher learning or - at best - having it interrupted, delayed and perhaps diminished.


One only needs to glance back at the tragic story of Lincoln College, which went from record student enrollment in 2019 to extinction in less than two years – closing at the conclusion of the 2021-22 academic year. Just a stunning, sad outcome.


According to the College’s official announcement, Lincoln “…was a victim of a cyberattack in December 2021 that thwarted admissions activities and hindered access to all institutional data…”. Lincoln further reported it took three months to fully restore the lifeblood of its information systems – recruitment, retention, and fundraising. Despite best efforts, a 157-year-old institution found itself with no viable option but to close its doors permanently.


According to the respected extensive annual research conducted by Ponemon Institute, contained in IBM’s 2024 Cost of a Data Breach Report, the price tag for those data breaches occurring from March 2023 through February 2024 at 604 impacted organizations spanning 17 industries and 16 countries reached an average of $4.88 million. This represents more than a $1 million average increase in four years. Unfortunately, the U.S. numbers are much worse at an average of $9.36 million.


Those seeking even a wisp of a silver lining can take comfort in the fact that education only ranked 15th of the 17 researched industries with a $3.5 million cost average across the 16 countries. The three primary components – detecting the breach in the first place, the revenue loss incurred due to the breach, and all the actions needed to resolve the breach – can each top $1 million.


So, what will the damage be if a data breach hits this campus?


The Ponemon analysis used activity-based costing – which assigns cost to each activity in an organization. This would include items such as the human and software costs incurred just to determine and investigate the breach, as well as the ensuing loss of revenue and reputation. The resources needed to recover from the cyberattack – bringing in third-party cybersecurity companies after the fact, sometimes paying ransom, maybe providing identity theft insurance, legal counsel fees, the entire public relations strain, and communicating with victims all take a bite from a very expensive pie. At least one state incident response law even includes a possible $750,000 fine.


What is often is overlooked is the potentially devastating loss in productivity by the many employees who find the institution’s IT environment to be their lifeblood – made worse of the breach happens at a critical time of year.


Every major breach reaction runs the risk of generating major financial penalties. As just one painful example, research found victims still paid ransom in 37 percent of cases when law enforcement was involved. Moreover, only 52 percent even involved law enforcement in the first place.


So, what practical, common-sense actions really exist?


A great place to start is engaging a true, trusted partner before a catastrophe occurs. A partner with a clear understanding of the rapidly evolving cybersecurity landscape from a higher education-specific perspective. One that recognizes the ‘enrollment cliff’ crisis, changing perceptions about the value of education, and the entire concept of openness and academic freedom that often poses unique challenges.


The Ponemon research reveals 26 factors either decreased or increased the total cost of the breach by at least $150,000 across all 17 industries and 16 countries. No institution can expect to find the right combination of investments and emphasis with so many factors at play.



Bill Balint is the owner of Haven Hill Services LLC, contracted as the Advisory CIO for Education at Trivigil.

By Bill Balint March 27, 2025
While National Cybersecurity Month (October) and National Data Privacy Week (late January) seemingly growing in adoption, a couple of more-recent cybersecurity events will hopefully take that next step. AI Fools Week (Naturally Kicking off ‘AI’pril) The good folks over at the National Cybersecurity Alliance (NCA) have created their inaugural artificial intelligence (AI) awareness campaign, fittingly entitled “AI Fools Week”, taking place the Week of March 31 ( https://www.staysafeonline.org/aifools ). NCA even jokingly refers to the month as “AIpril”.  As is often the case, NCA offers a very well-done toolkit of tip sheets, infographics, posters, etc. for those looking to initiate a ‘be safe when using AI” campaign at their institution or place of business. One of the NCA toolkit’s more ironic, but interesting ideas is to leverage a concept dating back to Ancient Greece by creating a shared password (safe word) to combat “deepfake” voicemails, messages, even video calls. The kit suggests safe word systems are worthy for consideration beyond families – such as with fellow employees, close friends, caregivers and groups reliant upon virtual communication. Identity Management Day 2025 Identity Management Day 2025 ( https://www.idsalliance.org/event/identity-management-day-2025 ) will take place immediately after AI Fools Week on April 8. The awareness focus is a free, day-long online conference. The NCA and the Identity Defined Security Alliance play host to the event, which started in 2021. Of course, adhering to safe computing practices in this rapidly changing landscape is a 365-day per year battle (366 during leap years - LOL). Some might consider it impossible to avoid deepfakes for long because so much is beyond the individual’s control – especially in a GenAI world. But the silver lining is any improvement in protection is a positive and the event is geared toward promoting best practices. Higher Education Cybersecurity Digital Magazines Awareness days and weeks are nice and all, but this is also a daily effort where timely, helpful information made available within a few clicks is a vital asset. This is one way digital magazines can make a difference. Higher education might increasingly be operating ‘like a business’, but access to information from those who understand the unique higher education environment remains a plus. Fortunately, higher education cybersecurity professionals can find plenty of education-specific content without cost. It is true the mix of public sector, non-profit and for-profit websites are valuable. But targeted digital magazines also provide critical additional insight. Though not a comprehensive review, three sites appear to be among the leaders in this space. EdTech magazine’s cybersecurity site ( https://edtechmagazine.com/higher/security ), for example, published nine (9) new articles during a recent three-month period, featuring diverse topics like identity and access management (IAM), student BYOD security challenges, AI, and the age-old technical debt implications for security and privacy. Each article places the material into a higher education-centric context. One specific nice feature is the site’s article filtering, which allows readers to deep dive into 14 sub-topics in an instant. Campus Technology magazine has been a friend to the higher education IT community for some 35 years (known as Syllabus from 1988-2004 before adopting its current name). Cybersecurity has been part of its content for multiple decades and its website touts a cybersecurity portal ( https://campustechnology.com/Portals/Cybersecurity.aspx ) full of articles, podcasts, webcasts and whitepapers. The site included 10 articles in a recent 90-day timeframe and these included information about subjects ranging from AI, Educause HECVAT’s release, Jamf’s purchase of Identity Automation, etc. Education Technology Insights ( https://www.educationtechnologyinsights.com ) offers content spanning the education sector, with a focus on “…bringing forth a complete picture of how teachers are using different classroom technologies…”. Although there does not appear to be a cybersecurity-specific part on the site, there is plenty of content found via a general search. There are loads of higher education-focused sites that offer cybersecurity content, but most do not have it as a specific focus area. Inside Higher Ed, University Business, and GovTech are just a few. Of course, there are also many cybersecurity digital magazines that cut across all industries and certain content has implications for the education sector. Bill Balint is the owner of Haven Hill Services LLC, contracted as TriVigil’s Advisory CIO for Education.
By John Schimanski March 12, 2025
Let’s talk about something that most Chief Information Security Officers (CISOs) hesitate to discuss, BURNOUT . Cybersecurity is a high-stakes, high-pressure field. The constant barrage of threats, the responsibility of protecting an organization’s digital infrastructure, and the expectation of being on-call 24/7 can take a toll. Burnout among CISOs and security professionals is real, prevalent, and dangerous , not just for individuals but for organizations as well. Burnout can manifest in various ways: self-medicating with alcohol or drugs, struggling with depression, losing the ability to make decisions, or feeling so overwhelmed that you shut down. The risk is even higher during crises, such as a major ransomware attack, where long hours and intense pressure become the norm. The good news? Burnout is preventable. Recognizing the signs early and taking proactive steps can make all the difference. Understanding Burnout in Cybersecurity Burnout doesn’t happen overnight; it’s a gradual process. Security professionals often start by feeling stressed and overworked, but over time, that stress turns into chronic exhaustion, cynicism, and decreased effectiveness . The key warning signs include: Constant fatigue despite adequate rest Loss of motivation or feeling disconnected from work Irritability or mood swings with colleagues or family Difficulty concentrating or making decisions Physical symptoms like headaches, insomnia, or muscle tension A sense of helplessness or feeling like you’re failing If these symptoms sound familiar, it’s time to take action. Strategies to Prevent and Combat Burnout 1. Take Strategic Breaks Security incidents demand immediate attention, but working under constant stress isn’t sustainable. Taking short breaks throughout the day can help lower stress levels. I personally step away from screens for at least 10 minutes every two hours to give my mind (and eyes) a reset. 2. Find an Outlet Beyond Work Engaging in activities that provide mental relief is essential. For me, that includes reading (both work-related and for pleasure), swimming, shooting, gaming, talking with friends, riding my trike, or going to the movies. Whatever it is for you, sports, music, art, hiking, find something that allows your brain to reset. 3. Use Your Vacation Time (and Actually Unplug!) Many of us accumulate vacation days but hesitate to use them, fearing work will pile up. Use your time off. Fully unplugging, even for a few days, can reset your perspective and prevent burnout from spiraling. 4. Set Realistic Expectations CISOs often feel like they must handle everything themselves. This mindset is a fast track to burnout. Know your limits and delegate where possible. If you have a team, trust them. Security is a team effort, and you don’t have to be a hero every day. 5. Prioritize Physical Health Regular exercise is one of the best tools against stress. Studies show that physical activity boosts serotonin and helps improve cognitive function. Even a short walk or stretching routine can have a profound impact on your mental state. 6. Create a Routine to Reduce Decision Fatigue CISOs make critical decisions every day. Over time, constant decision-making wears down mental resources. Structuring parts of your day, whether it’s a morning routine, meal planning, or even wearing the same style of clothing, can free up brainpower for more important decisions. Top executives, from Steve Jobs to U.S. presidents, rely on routines to reduce decision fatigue. 7. Get Enough Sleep (And Learn to Recognize Fatigue) It sounds simple, but lack of sleep is one of the biggest contributors to burnout. Fatigue affects judgment, reaction time, and emotional resilience. If you’re waking up exhausted, it’s time to reassess your sleep habits. Short naps can also provide quick recovery when needed. 8. Talk About It—Don’t Struggle Alone Burnout thrives in isolation. CISOs are often expected to be strong, resilient, and unshakable, but everyone needs support. Find someone you trust, a friend, colleague, mentor, or therapist—and talk about what you're experiencing. Sometimes, just saying things out loud can bring clarity and solutions. Final Thoughts Burnout isn’t a sign of weakness; it’s a signal that something needs to change. Recognizing the warning signs and taking proactive steps can prevent long-term damage to both your well-being and your career. If you’re feeling overwhelmed, step back, reset, and reach out. You’re not alone, and help is available. Cybersecurity is a tough job, but it shouldn’t come at the cost of your health and happiness.
By Bill Balint February 27, 2025
A little cottage industry seemingly arises at the conclusion of each decade, joyously pointing out those long-since forgotten, failed techy items from the past 10 years that were supposed to impact the world but were miserable failures instead. While we are only at the midpoint of the 2020s, it is safe to say AI will not be the next Google Glass, 3D television or the loads of other mainstays on the 2010s lists of IT infamy. Higher education quickly realized both the potential AI positives and negatives as it applied to the teaching, learning and academic research space (think plagiarism on one hand matched against the prospect of personalized learning on the other). Underscoring this fact is the groundbreaking recent announcement that the California State University System intends to become the nation’s “first and largest AI-empowered university system” ( https://www.calstate.edu/csu-system/news/Pages/CSU-AI-Powered-Initiative.aspx ). However, AI adoption for administrative tasks – providing desperately-needed help as struggling institutions look to lower costs, attract/retain more students, and obtain external support via fundraising, grants, etc. – has been a little more deliberate. But this is changing fast, as it seems every higher education information system vendor is now flexing its AI muscles – or at least the sales and marketing teams are doing so. Phrases like ‘Throw your CRMs into the trash bin because mine innovates using AI’ or ‘I’ll see your legacy registration system and raise you a machine language course schedule wizard’ are lurking in that sea of PR if you read between the lines hard enough. The fear of missing the AI train must be balanced because higher education cybersecurity and data privacy risks because AI requires data and that’s where things get complicated. Higher education is always among the most vulnerable industries because its data is so valuable to cyber attackers, and it is considered an easy target. No industry has the combination of user churn, number of inexperienced and casual users, the plethora of personal devices, and an overriding culture of openness. Couple it with IT budgets and staffing often facing unprecedented challenges and it is a mix that attracts bad actors from across the globe. The increasing AI usage will likely bring even more frequent, more sophisticated attacks. Adding to the complexity is the presence of shadow systems housing sensitive or confidential data lurking in higher education for some 40 years. Among the relevant examples are a power user downloading student fiscal data onto a personal hard drive, a researcher locally storing sensitive data, and an office which has deployed an information system for which the IT department does not even know exists. Consider the dark possibilities if a user innocently exposes such data to a GenAI model.  This all means answers to traditional questions like ‘Where is the data actually stored and what security measures exist for that data both at rest and in transit?’ and ‘How robust are the tools restricting data access?’ deserve more scrutiny than ever. Perhaps more importantly, the question of ‘Does my executive who listened to AI hype at a conference last week and is now eager to buy an AI-infused product fully grasp the potential risk?’ At one time, it may have taken a concerning cybersecurity audit finding to catch the attention of the institution’s board or cabinet. But these can no longer those times and executive recognition of AI risk up front is critical. Executive leadership should prioritize the creation of practical, common-sense policies governing AI usage. Tactical and operational leadership needs empowered to keep those policies up to date and to make key decisions on tools and techniques to help keep data safe. They can then build appropriate procedures, guidelines, standards, FAQs, and best practices so users can effectively work in an emerging AI world. Bill Balint is the owner of Haven Hill Services LLC, contracted as TriVigil’s Advisory CIO for Education.
Share by: