Close Menu
  • Home
  • AI Models
    • DeepSeek
    • xAI
    • OpenAI
    • Meta AI Llama
    • Google DeepMind
    • Amazon AWS AI
    • Microsoft AI
    • Anthropic (Claude)
    • NVIDIA AI
    • IBM WatsonX Granite 3.1
    • Adobe Sensi
    • Hugging Face
    • Alibaba Cloud (Qwen)
    • Baidu (ERNIE)
    • C3 AI
    • DataRobot
    • Mistral AI
    • Moonshot AI (Kimi)
    • Google Gemma
    • xAI
    • Stability AI
    • H20.ai
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Microsoft Research
    • Meta AI Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding & Startups
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • Expert Insights & Videos
    • Google DeepMind
    • Lex Fridman
    • Matt Wolfe AI
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • Matt Wolfe AI
    • The TechLead
    • Andrew Ng
    • OpenAI
  • Expert Blogs
    • François Chollet
    • Gary Marcus
    • IBM
    • Jack Clark
    • Jeremy Howard
    • Melanie Mitchell
    • Andrew Ng
    • Andrej Karpathy
    • Sebastian Ruder
    • Rachel Thomas
    • IBM
  • AI Policy & Ethics
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
    • EFF AI
    • European Commission AI
    • Partnership on AI
    • Stanford HAI Policy
    • Mozilla Foundation AI
    • Future of Life Institute
    • Center for AI Safety
    • World Economic Forum AI
  • AI Tools & Product Releases
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
    • Image Generation
    • Video Generation
    • Writing Tools
    • AI for Recruitment
    • Voice/Audio Generation
  • Industry Applications
    • Finance AI
    • Healthcare AI
    • Legal AI
    • Manufacturing AI
    • Media & Entertainment
    • Transportation AI
    • Education AI
    • Retail AI
    • Agriculture AI
    • Energy AI
  • AI Art & Entertainment
    • AI Art News Blog
    • Artvy Blog » AI Art Blog
    • Weird Wonderful AI Art Blog
    • The Chainsaw » AI Art
    • Artvy Blog » AI Art Blog
What's Hot

Delta Activations: A Representation for Finetuned Large Language Models – Takara TLDR

Fraud Remote Jobs Exposed: The Hidden Role of Claude AI

Google Gemini dubbed ‘high risk’ for kids and teens in new safety assessment

Facebook X (Twitter) Instagram
Advanced AI News
  • Home
  • AI Models
    • OpenAI (GPT-4 / GPT-4o)
    • Anthropic (Claude 3)
    • Google DeepMind (Gemini)
    • Meta (LLaMA)
    • Cohere (Command R)
    • Amazon (Titan)
    • IBM (Watsonx)
    • Inflection AI (Pi)
  • AI Research
    • Allen Institue for AI
    • arXiv AI
    • Berkeley AI Research
    • CMU AI
    • Google Research
    • Meta AI Research
    • Microsoft Research
    • OpenAI Research
    • Stanford HAI
    • MIT CSAIL
    • Harvard AI
  • AI Funding
    • AI Funding Database
    • CBInsights AI
    • Crunchbase AI
    • Data Robot Blog
    • TechCrunch AI
    • VentureBeat AI
    • The Information AI
    • Sifted AI
    • WIRED AI
    • Fortune AI
    • PitchBook
    • TechRepublic
    • SiliconANGLE – Big Data
    • MIT News
    • Data Robot Blog
  • AI Experts
    • Google DeepMind
    • Lex Fridman
    • Meta AI Llama
    • Yannic Kilcher
    • Two Minute Papers
    • AI Explained
    • TheAIEdge
    • The TechLead
    • Matt Wolfe AI
    • Andrew Ng
    • OpenAI
    • Expert Blogs
      • François Chollet
      • Gary Marcus
      • IBM
      • Jack Clark
      • Jeremy Howard
      • Melanie Mitchell
      • Andrew Ng
      • Andrej Karpathy
      • Sebastian Ruder
      • Rachel Thomas
      • IBM
  • AI Tools
    • AI Assistants
    • AI for Recruitment
    • AI Search
    • Coding Assistants
    • Customer Service AI
  • AI Policy
    • ACLU AI
    • AI Now Institute
    • Center for AI Safety
  • Business AI
    • Advanced AI News Features
    • Finance AI
    • Healthcare AI
    • Education AI
    • Energy AI
    • Legal AI
LinkedIn Instagram YouTube Threads X (Twitter)
Advanced AI News
Education AI

Under Siege: How Schools Are Fighting Back Against Rising Cyber Threats

By Advanced AI EditorSeptember 4, 2025No Comments8 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Brandon Gabel expected an ordinary day of remote work when he woke up at 5:45 on a January morning in 2024. By 8:30 a.m., he was racing to his office, simultaneously fielding calls from the FBI, Arizona homeland security and insurance providers. His school district had just become the latest casualty in a wave of cyberattacks sweeping across the nation.

“They were in our network for a few hours before I cut the VPN [virtual private network] and shut them out,” says Gabel, technology director for Agua Fria Union High School District in Arizona. Thanks to state-funded cybersecurity tools, including CrowdStrike, to handle endpoint protection and response (EDR), the attackers walked away empty-handed.

Gabel had created an incident response plan about five months earlier. When the attack happened, they put the plan into action. Still, the near-miss underscored a sobering reality: Schools are now battlefields in the digital war.

According to the nonprofit Center for Internet Security’s 2025 MS-ISAC K-12 Cybersecurity Report: Where Education Meets Community Resilience, 82 percent of reporting schools experienced cyber incidents between July 2023 and December 2024, with more than 9,300 confirmed incidents. What was once considered a corporate problem has become every district’s nightmare.

From Playground to Battleground

Not long ago, the worst digital headache for a school was a broken laptop or a sluggish Wi-Fi signal. Today, the stakes are existential. Districts hold sensitive data on thousands of children and families, including addresses, medical information, even financial records for meal payments. The stolen data can be used for identity theft, fraud or extortion. Children are particularly vulnerable since compromised identities may go undetected for years. In addition, a data breach can cause reputational and financial damage for the district. All of this makes districts lucrative targets.

It’s not the prince in Africa anymore. With AI, phishing emails look legitimate now.

— Chantell Manahan, Steuben County MSD, Indiana

“It’s not the prince in Africa anymore,” says Chantell Manahan, director of technology at MSD of Steuben County in Indiana. “With AI, phishing emails look legitimate now.”

Teachers now face the unnerving task of evaluating whether an email from their principal is genuine — or a cleverly disguised trap.

Doug Couture, director of technology at South Windsor Public Schools in Connecticut, puts it bluntly: “Generative AI has weaponized phishing. Even seasoned staff can’t always tell the difference.”

The Human Firewall

As threats evolve, districts are discovering that the first line of defense is not a piece of software; it’s people. Training teachers, administrators, staff and students to spot danger has become as critical as practicing fire drills or lockdown procedures.

Manahan remembers when one of her staffers nearly clicked a malicious link in what looked like a routine Amazon gift card offer. If a veteran tech employee could be tricked, she reasoned, everyone was at risk.

Since then, her district has reimagined training as a district-wide responsibility. “We’ve empowered every educator to be a digital guardian,” she says. Tech staff complete courses through Udemy; all employees have access to KnowBe4 courses and CyberNut training. Manahan hopes to offer CyberNut (a digital literacy and cybersecurity program that teaches students how to recognize online threats, protect their personal information and build safe technology habits) for high school students this school year, too.

Other districts have found that incentives matter. Couture’s team hands out Swedish Fish to staff who report suspicious emails. “The training shouldn’t feel punitive,” he says. “It should reward people for vigilance.”

These small gestures have ripple effects. Reporting suspicious emails becomes a point of pride, not a punishment. The act of defending the school network turns into a shared culture rather than an IT department’s thankless task.

Small Districts in the Crosshairs

Still, not all districts enter this fight with equal weapons. Wealthier or larger systems can afford larger tech teams and advanced defenses; smaller communities often cannot.

In Medway, Massachusetts, Richard Boucher oversees IT for both the schools and the town. “My network engineer and I spend more than half of each day on cyber defense,” says Boucher. Their layered defense system includes Sophos-managed endpoint protection and response, managed detection and response, network detection and response, AI-powered email filtering, continuous vendor monitoring and regular penetration tests. During one unannounced penetration test with third-party software — in which the IT department pretended to hack into its own system — Sophos called in just two minutes — proof that vigilance pays off.

But Boucher admits their system works because of careful prioritization and significant local investment. For many districts, such resources are out of reach. That’s where state partnerships make a difference.

The Indiana Department of Education provides free cyber assessments through local universities, complete with recommendations leaders can share with boards and parents. Arizona’s Department of Homeland Security’s Statewide Cyber Readiness Program supplies CrowdStrike licenses, advanced endpoint protection, anti-phishing/security awareness training and more.

“Without that program, we never would have had the protection we do,” says Gabel. “We couldn’t afford it.”

Cyber Safety as Culture

Technology alone cannot win this fight. The districts making the most progress are reframing cybersecurity as a cultural issue, not a technology checklist.

Amy McLaughlin, who leads cybersecurity projects for the Consortium for School Networking or CoSN, prefers the term “cyber safety.” The language matters, she argues, because it makes everyone — not just IT staff — responsible. “We all know the protocols for locking school doors. This is the electronic version,” she says.

That cultural framing opens the door to creative engagement. In Indiana, Manahan gives CyberNut socks and “phishing” pens to top reporters of suspicious emails. Her school board received Goldfish crackers labeled Don’t Get Phished during Cybersecurity Awareness Month.

William Stein, director of information systems at MSD of Mt. Vernon in Indiana, delivers cookies to staff who correctly identify fake phishing emails and runs “Two-Factor Tuesday” raffles for employees who enable multi-factor authentication (MFA) on personal accounts. Couture tries to make his messaging about cyber vigilance humorous, like the time he used the term “nefarious n’er-do-wells” in an email.

Storytelling is another powerful tool. Stein shares short narratives of real attacks on his Cyber Shorts website to make the abstract concrete. “People remember stories more than protocols,” he says.

The Cost of Complacency

For all the sophisticated new tools, experts agree that the fundamentals are often the weak link. Patching or updating outdated systems, fixing known software vulnerabilities, auditing accounts, enforcing strong passwords and mandating MFA stop a large share of attacks before they start.

Focus on the biggest risks. Up to 40 percent of breaches start with patching problems.

— William Stein, Mt. Vernon MSD, Indiana

“Focus on the biggest risks,” says Stein. “Up to 40 percent of breaches start with patching problems.”

Gabel learned that lesson firsthand. “Former tech teams had left behind old service accounts I hadn’t audited. That’s where the attack hit. Audit, audit, audit.”

When an attack does succeed, recovery costs can vary dramatically. By keeping incident response in-house, Gabel’s district contained its recovery to less than $100,000. Many others have not been so fortunate, with ransomware payouts, school closures and system rebuilds stretching into millions. According to a 2025 report by IBM, the global average cost of a data breach is $4.4 million. At the same time, cyber budgets represent about 6.6 percent of the IT budget across all sectors — at the lower end of the recommended range of 5 percent to 10 percent, according to one 2024 study.

Human exhaustion is another cost. “I get unhappy customers when we run phishing simulations,” says Chris Bailey, technology director at Edmonds School District in Washington. “People say they can’t trust their emails anymore. But that’s exactly the point. You have to learn to not trust email.”

Establishing Resilience

Looking ahead, experts see the next stage of progress not in buying more tools but in building resilient systems and communities.

Districts are starting to move from reactive firefighting to proactive resilience planning. That means tabletop exercises — practice drills where leaders talk through how they’d respond to a cyberattack — along with statewide collaboration networks and formal pacts where neighboring districts promise to support one another during a crisis. Modeled after fire department and disaster relief systems, these agreements let schools share tech staff, loan backup resources or even assist with parent communications when one district is overwhelmed by an attack. The goal is to ensure that no school has to stand alone in its darkest moment.

CoSN’s McLaughlin encourages districts to share resources and lessons rather than operating in silos: “No one should be doing this alone,” she says.

The imbalance will always remain: Attackers need only one vulnerability; defenders must protect them all. But districts are proving that preparation, creativity and collaboration can shift the odds.

At Agua Fria, Gabel reflects on his incident with humility as well as pride: “We were lucky, but we were also ready. If we hadn’t invested in training, partnerships and fundamentals, the story would have ended differently.”



Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy the US government is taking a stake in Intel
Next Article De minimis’ end: How shippers are adapting for peak season and beyond
Advanced AI Editor
  • Website

Related Posts

I Want My Students’ Effort, Not AI’s Shortcut to Perfect Writing

September 3, 2025

Teachers Try to Take Time Back Using AI Tools

August 25, 2025

More Schools Are Considering Education-Focused AI Tools. What’s the Best Way to Use Them?

August 22, 2025

Comments are closed.

Latest Posts

Basquiats Linked to 1MDB Scandal Auctioned by US Government

US Ambassador to UK Fills Residence with Impressionist Masters

New Code of Ethics Implores UK Museums to End Fossil Fuel Sponsorships

Art Basel Paris Director Clément Delépine to Lead Lafayette Anticipations

Latest Posts

Delta Activations: A Representation for Finetuned Large Language Models – Takara TLDR

September 6, 2025

Fraud Remote Jobs Exposed: The Hidden Role of Claude AI

September 6, 2025

Google Gemini dubbed ‘high risk’ for kids and teens in new safety assessment

September 6, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Delta Activations: A Representation for Finetuned Large Language Models – Takara TLDR
  • Fraud Remote Jobs Exposed: The Hidden Role of Claude AI
  • Google Gemini dubbed ‘high risk’ for kids and teens in new safety assessment
  • Towards a Unified View of Large Language Model Post-Training – Takara TLDR
  • OpenAI boss Sam Altman dons metaphorical hot dog suit as he realises, huh, there sure are a lot of annoying AI-powered bots online these days

Recent Comments

  1. Jeffreyorics on 1-800-CHAT-GPT—12 Days of OpenAI: Day 10
  2. goofybeetle9Nalay on Ballet Tech Forms The Future Through Dance
  3. blazecrew2Nalay on Ballet Tech Forms The Future Through Dance
  4. goofybeetle9Nalay on Marc Raibert: Boston Dynamics and the Future of Robotics | Lex Fridman Podcast #412
  5. zestycrow4Nalay on Study: AI-Powered Research Prowess Now Outstrips Human Experts, Raising Bioweapon Risks

Welcome to Advanced AI News—your ultimate destination for the latest advancements, insights, and breakthroughs in artificial intelligence.

At Advanced AI News, we are passionate about keeping you informed on the cutting edge of AI technology, from groundbreaking research to emerging startups, expert insights, and real-world applications. Our mission is to deliver high-quality, up-to-date, and insightful content that empowers AI enthusiasts, professionals, and businesses to stay ahead in this fast-evolving field.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

LinkedIn Instagram YouTube Threads X (Twitter)
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 advancedainews. Designed by advancedainews.

Type above and press Enter to search. Press Esc to cancel.