Skip to the main content.
Quest Nav Graphic

Gain access to Quest™, our innovative and powerful platform that delivers quick access to service requests, real-time project status, and powerful automation for onboarding new employees and more.

 

 

PROFESSIONAL SERVICES

Leverage our expertise to optimize your IT environment and work towards compliance goals.

GOV Rounded Edge Images_Short (5)

 

ABOUT SOURCEPASS GOV

Our team is comprised of industry experts with a deep history in working with the public sector.

1 min read

The PowerSchool Cybersecurity Incident

The PowerSchool Cybersecurity Incident

On December 28th, PowerSchool, a leading education technology software platform for North American schools, confirmed a cyberattack that resulted in the theft of sensitive student and teacher information.

This breach involved unauthorized access to certain PowerSchool Student Information System (SIS) data through one of its community-focused customer portals, PowerSource.

PowerSchool Breach: A Lesson in Cybersecurity and Third-Party Vendors

 

PowerSchool provides a cloud-based platform to K-12 schools across North America, supporting over 60 million students.

The company offers a comprehensive range of services to help school districts operate efficiently, including platforms for enrollment, communication, attendance, staff management, learning systems, analytics, and finance.

According to PowerSchool’s statement, the company is not experiencing, nor does it expect to experience, any operational disruption and continues to provide services as usual. There is no evidence that other PowerSchool products were affected by this incident or that malware or continued unauthorized activity exists within the PowerSchool environment.

On January 13th, PowerSchool reported that some personally identifiable information (PII), such as social security numbers (SSN) and medical information, was involved for certain individuals. The company is working urgently to complete its investigation and identify the individuals whose data may have been compromised.

Key Takeaway: Do not assume third-party vendors have you covered. As Ed Law 2d requires, it is not enough to identify and document your vendors; it is essential to understand the security controls your vendor uses to secure your data.

 

Best Practices for K-12 School Districts:

  • Identify all applications containing sensitive data: School administrators must be vigilant about updating their application inventory and identifying applications that store, process, and transmit sensitive information.
  • Evaluate third-party vendor risk: Assess the risk when your data is stored, processed, or transferred using your vendor’s service. If you need help…
  • Have Sourcepass GOV conduct a cybersecurity risk assessment: Assess third-party risk, identify gaps in security control best practices, and receive recommendations for closing those gaps.

The PowerSchool breach underscores the importance of robust cybersecurity measures in protecting sensitive educational data. Schools and parents must remain proactive in safeguarding student information, whether it is locally stored or held by a third party.

 

Want to Learn More? Sourcepass GOV Can Help! 

 

At Sourcepass GOV, our data security experts evaluate the risk of losing student and employee data confidentiality, integrity, and availability. We provide a comprehensive report with recommendations to strengthen security safeguards and protect your critical data.

Contact Sourcepass GOV today if you have any questions about third-party risk, cybersecurity risk, or protecting sensitive data.

The Role of IT in Enhancing Public Safety Communications Systems

11 min read

The Role of IT in Enhancing Public Safety Communications Systems

In today’s rapidly evolving technological landscape, public safety agencies rely on robust communication systems to protect communities and respond...

Read More
Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

6 min read

Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

In November 2021, the Department of Defense (DoD) announced the transition from CMMC 1.0 to CMMC 2.0, streamlining the certification process and...

Read More
What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

3 min read

What You Need to Know About CMMC 1.0 and the Transition to CMMC 2.0

The Cybersecurity Maturity Model Certification (CMMC) 1.0 was a groundbreaking initiative introduced by the U.S. Department of Defense (DoD) to...

Read More
The Rising Threat of Ransomware in K-12 Schools

The Rising Threat of Ransomware in K-12 Schools

In recent years, the education sector has witnessed a troubling surge in ransomware attacks, with K-12 schools becoming prime targets for cyber...

Read More
Enhancing School Cybersecurity: Leveraging Federal Support and PDNS Services

Enhancing School Cybersecurity: Leveraging Federal Support and PDNS Services

With the increase of cyberattacks targeting educational institutions, the White House launched a critical initiative aimed at strengthening the...

Read More
10 Cybersecurity Strategies for Protecting Citizen Data

10 Cybersecurity Strategies for Protecting Citizen Data

In an era where data is a critical asset, safeguarding citizen information is paramount for public sector organizations.

Read More