Pupils hacking their own schools for fun, watchdog warns
Briefly

Pupils hacking their own schools for fun, watchdog warns
"Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging. At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story."
"The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.Your support makes all the difference. A government watchdog has warned of an insider threat of students hacking their own school systems after a rise in cyber attacks."
"The Information Commissioner's Office (ICO) revealed a worrying pattern revealing that that pupils themselves are responsible for over half of school insider cyber attacks. It said that while these attacks may begin as a bit of fun in school, they can cause real damage and warns that this could have consequences for young people, setting them up for a life of cyber crime."
The Information Commissioner's Office (ICO) analysed 215 personal data breach reports in the education sector between January 2022 and 2024 and found that students caused 57% of insider cyber incidents. Many incidents began as pranks but produced real damage and could lead to long-term consequences, including grooming toward cyber crime. Almost a third of insider attacks resulted from students guessing weak passwords or finding them written on paper. The ICO warned of an insider threat as pupils increasingly hack their own school systems amid a rise in cyber attacks. The pattern highlights weak password practices and easy internal access as major vulnerabilities.
Read at www.independent.co.uk
Unable to calculate read time
[
|
]