• Discounts and special offers
  • Subscriber-only articles and interviews
  • Breaking news and trending topics

Already a subscriber?

By signing up, you accept Moneywise's Terms of Use, Subscription Agreement, and Privacy Policy.

Not interested ?

Top Stories
University students sit in a lecture hall on their laptops Jim Sugar / Getty Images

Thousands of universities were hacked in the largest educational security breach ever. Here's what to do when your children's personal data is stolen

In an era where every little detail about your personal life is shared and transmitted digitally, the fear of your information being compromised is very real. But when it comes to the personal information of your children, that fear becomes amplified by a significant magnitude.

That's where Cary, North Carolina native Lisa Baildon found herself after her daughter's school, Millbrook High, was the victim of a cybersecurity breach in early May. The program they use for remote learning, Canvas, was compromised. The data breach affected an estimated 9,000 institutions across Australia, Canada and the United States, including universities, whose students were in the midst of finals.

Advertisement

"Who did it and what are they going to do with the data?" she said, during an interview with ABC 11 (1).

The Canvas breach is part of a bigger problem

Canvas, for those unfamiliar, is an online platform that allows students to access schoolwork, submit assignments and store grades. For university students, financial details factor in far greater than with high schools. To be clear, though, there is no evidence suggesting passwords, dates of birth or financial information were shared.

At Mississippi State University, Aubrey Palmer, a meteorology student, told the BBC (2) they had just finished a 2,900-word essay exam when they received an alert on their screens.

"ShinyHunters has breached Instructure (again)," it read.

ShinyHunters (3) is a hacker and extortion group that has been active since 2020. It has been responsible for several massive data breaches, data theft and extortion efforts targeting global corporations and organizations like AT&T (4), Google (5) and Ticketmaster (6).

ShinyHunters typically does its work by making English-language phone calls and impersonating employees to trick company staff into granting access. In this instance, they exploited flaws in the Free-For-Teacher accounts on April 29. Canvas owner and developer Instructure said hackers were able to obtain names, email addresses, student ID numbers and user messages.

The threat was thought to have receded, but ShinyHunters regained access the very next day, on April 30.

Advertisement

This is not a one-off either. In 2024, logins and credentials for PowerSchool contract employees were compromised (7), exposing names, addresses and email information. The North Carolina Department of Public Instruction shifted all of their information to an online portal.

Must Read

Join 250,000+ readers and get Moneywise’s best stories and exclusive interviews first — clear insights curated and delivered weekly. Subscribe now.

How parents can protect their child's personal information

Kimberly Simon, CEO of Growth Office Partners in Durham, North Carolina, said families should stay vigilant when it comes to suspicious communications (8).

"Be extra cautious about any emails that are now coming in asking for information and pretending to be the school," she told ABC 11. "The second thing is to turn on multi-factor authentication on every single account. This should already be done."

Multi-factor authentication means users will need more than one piece of information to get into an account on top of a password. You can set up a password plus a code that's sent to your phone by text or through email.

Additionally, people should update their passwords regularly and ensure the same ones are not being used for multiple accounts (9).

The best way to safeguard the cybersecurity of your family is to use a multi-pronged strategy, also known as a defense in depth (10). That way, if one defense fails, there are still other safeguards in place to mitigate damages or breaches.

Article Sources

We rely only on vetted sources and credible third-party reporting. For details, see our ethics and guidelines.

ABC 11 (1),(8); BBC (2); Google Cloud (3); Wired (4),(6); PC Mag (5),(9); Security.org (7); Fortinet (10)

You May Also Like

Share this:
Brian Baker Associate Editor

Brian Baker is an Associate Editor with Moneywise. He has been a media professional for over 20 years.

more from Brian Baker

Explore the latest

Disclaimer

The content provided on Moneywise is information to help users become financially literate. It is neither investment, tax nor legal advice, is not intended to be relied upon as a forecast, research or investment advice, and is not a recommendation, offer or solicitation to buy or sell any securities, enter into any loan, mortgage or insurance agreements or to adopt any investment strategy. Tax, investment and all other decisions should be made, as appropriate, only with guidance from a qualified professional. We make no representation or warranty of any kind, either express or implied, with respect to the data provided, the timeliness thereof, the results to be obtained by the use thereof or any other matter. Advertisers are not responsible for the content of this site, including any editorials or reviews that may appear on this site. For complete and current information on any advertiser product, please visit their website.

†Terms and Conditions apply.