TASB Risk Management Fund
INSIDERM

7 Tips for Protecting Your District from Cybercriminals

November 13, 2018 Jessica Clark and David Wylie

cybersecurity shield

Teacher salaries, student transportation, and facilities maintenance are just a handful of the many line items on school districts’ budgets. Right now, criminals could be trying to steal your much-needed funds and, ultimately, compromise your ability to deliver a quality education to Texas school children.

The scam is called phishing, and its perpetrators – known as cybercriminals – are responsible for some of the largest thefts involving school districts in recent years. The TASB Risk Management Fund (Fund) encourages districts to learn the warning signs of phishing and follow seven simple steps to avoid becoming victims.

How phishing works

The cybercriminals behind phishing scams are wolves in sheep’s clothing. Masquerading as legitimate vendors, and even as employees or staff, they trick unsuspecting districts into sending money directly to them. Phishing scams come in many forms, but the three most common are:

  • Bogus invoice/wire transfer: Cybercriminals call, email, or fax, posing as a supplier, vendor, or contractor, and request transfers for payments to an account they own. Because these scams have no malicious links or attachments, they often evade technical controls, such as email filters.
  • Staff impersonation/executive fraud: This scam hinges on cybercriminals creating fake emails that appear to be from someone in a position of authority, such as a board member, CFO, or superintendent. The email targets employees who have access to the bank account, and the request is often marked urgent to encourage recipients to bypass approval procedures.
  • Account compromise: Instead of creating fake emails, cybercriminals hack directly into a victim’s email account. The victim could be someone in a position of authority, a vendor, or even an employee or staff member. The email requests invoice payments to vendors or contacts in the victim’s address book. In the case of employees and staff, the scam involves a seemingly legitimate request to modify payroll information. The attacker sets “rules” in the email account to ensure the real employee is never notified about the changes. Attackers can also target social security numbers, dates of birth, and other personally identifiable information to conduct W2 fraud and identify theft. That is why it is important to confirm transaction requests via a means other than email (see #2 below).

What you can do about it

  1. Limit the information your district shares: Cybercriminals carefully research and closely monitor their target victims and organizations. They use information published on websites and social media pages to make plausible requests for funds. Under financial transparency requirements, including public check registers, districts must disclose certain information on their websites. For now, the Fund recommends districts avoid posting vendor names and all information labeled “optional” in this resource from TASB Legal Services.

  2. Confirm the transaction request: Implement a non-email verification process for transactions over a threshold amount. For example, call the contact listed on your vendor contract to confirm that the request is legitimate.
  3. Avoid wire transfers when possible: Use paper checks instead. If a wire transfer is necessary, require the employee making the transfer to have someone else review the request before transferring the funds.  
  4. Assign designated contacts: Designate a contact to represent each vendor. The authorized contact is the only person who has the authority to request payment or changes to a contract or invoice.
  5. Implement controls with financial institutions: Designate a representative from financial institutions who can provide telephone authorization for certain transactions, such as wire transfers or other electronic payments, or transactions over a specific amount.
  6. Train your staff: Many phishing scams succeed because staff does not recognize the warning signs. As part of your security-related policies and procedures, teach staff to recognize indicators of fraudulent activity. For example, phishing email subject lines often include words such as request, payment, transfer, or urgent. In addition, make sure staff knows how to report suspicious activity to IT/security.
  7. Work with IT: A district’s IT department can monitor email exchange servers for changes in configurations and custom rules that have been applied to accounts, which are warning signs of phishing scams.

The Fund is here for our members

Because of the recent success of phishing scams, attacks are intensifying. The Fund provides cybersecurity and data incident response coverage to members of the Property and Liability programs. Losses will be covered if members work with Fund vendors on response and recovery. Members that suspect they have been the target of phishing scams should call us immediately at 855.295.8344 and report a claim.

Tagged: "cyber security", cybersecurity, "data breach"