Skip to the main content.
Quest Nav Graphic

Gain access to Quest™, our innovative and powerful platform that delivers quick access to service requests, real-time project status, and powerful automation for onboarding new employees and more.

 

 

PROFESSIONAL SERVICES

Leverage our expertise to optimize your IT environment and work towards compliance goals.

GOV Rounded Edge Images_Short (5)

 

ABOUT SOURCEPASS GOV

Our team is comprised of industry experts with a deep history in working with the public sector.

1 min read

The PowerSchool Cybersecurity Incident

The PowerSchool Cybersecurity Incident

On December 28th, PowerSchool, a leading education technology software platform for North American schools, confirmed a cyberattack that resulted in the theft of sensitive student and teacher information.

This breach involved unauthorized access to certain PowerSchool Student Information System (SIS) data through one of its community-focused customer portals, PowerSource.

PowerSchool Breach: A Lesson in Cybersecurity and Third-Party Vendors

 

PowerSchool provides a cloud-based platform to K-12 schools across North America, supporting over 60 million students.

The company offers a comprehensive range of services to help school districts operate efficiently, including platforms for enrollment, communication, attendance, staff management, learning systems, analytics, and finance.

According to PowerSchool’s statement, the company is not experiencing, nor does it expect to experience, any operational disruption and continues to provide services as usual. There is no evidence that other PowerSchool products were affected by this incident or that malware or continued unauthorized activity exists within the PowerSchool environment.

On January 13th, PowerSchool reported that some personally identifiable information (PII), such as social security numbers (SSN) and medical information, was involved for certain individuals. The company is working urgently to complete its investigation and identify the individuals whose data may have been compromised.

Key Takeaway: Do not assume third-party vendors have you covered. As Ed Law 2d requires, it is not enough to identify and document your vendors; it is essential to understand the security controls your vendor uses to secure your data.

 

Best Practices for K-12 School Districts:

  • Identify all applications containing sensitive data: School administrators must be vigilant about updating their application inventory and identifying applications that store, process, and transmit sensitive information.
  • Evaluate third-party vendor risk: Assess the risk when your data is stored, processed, or transferred using your vendor’s service. If you need help…
  • Have Sourcepass GOV conduct a cybersecurity risk assessment: Assess third-party risk, identify gaps in security control best practices, and receive recommendations for closing those gaps.

The PowerSchool breach underscores the importance of robust cybersecurity measures in protecting sensitive educational data. Schools and parents must remain proactive in safeguarding student information, whether it is locally stored or held by a third party.

 

Want to Learn More? Sourcepass GOV Can Help! 

 

At Sourcepass GOV, our data security experts evaluate the risk of losing student and employee data confidentiality, integrity, and availability. We provide a comprehensive report with recommendations to strengthen security safeguards and protect your critical data.

Contact Sourcepass GOV today if you have any questions about third-party risk, cybersecurity risk, or protecting sensitive data.

Navigating the Grant Application Process for IT Services in the Public Sector

3 min read

Navigating the Grant Application Process for IT Services in the Public Sector

The public sector faces increasing pressure to modernize its IT infrastructure and services. However, budget constraints often pose significant...

Read More
Safeguarding Schools: Insights from the 2025 CIS MS-ISAC K-12 Cybersecurity Report

7 min read

Safeguarding Schools: Insights from the 2025 CIS MS-ISAC K-12 Cybersecurity Report

In the "2025 CIS MS-ISAC K-12 Cybersecurity Report: Where Education Meets Community Resilience," the results from an analysis of more than 5,000 K-12...

Read More
Top Cybersecurity Challenges for Local Government

3 min read

Top Cybersecurity Challenges for Local Government

In 2025, local governments across the United States are dealing with new and emerging cyber threats. As technology evolves, so do the tactics of...

Read More
Safeguarding Schools: Insights from the 2025 CIS MS-ISAC K-12 Cybersecurity Report

Safeguarding Schools: Insights from the 2025 CIS MS-ISAC K-12 Cybersecurity Report

In the "2025 CIS MS-ISAC K-12 Cybersecurity Report: Where Education Meets Community Resilience," the results from an analysis of more than 5,000 K-12...

Read More
Enhancing School Cybersecurity: Leveraging Federal Support and PDNS Services

Enhancing School Cybersecurity: Leveraging Federal Support and PDNS Services

With the increase of cyberattacks targeting educational institutions, the White House launched a critical initiative aimed at strengthening the...

Read More
The Rise of Phishing Attacks in Schools: How to Protect Students and Staff

The Rise of Phishing Attacks in Schools: How to Protect Students and Staff

Schools and educational institutions have become prime targets for phishing attacks. Cybercriminals are exploiting vulnerabilities in school...

Read More