Hack Alert: Chattanooga State Community College

Scalable Business Technologies and No Phish Left Behind are not affiliated with nor do we condone illegal and harmful activities. As part of our ongoing efforts to educate the general community and encourage consumer privacy, cyberawareness, and safe browsing, we do occasionally report on larger security breaches strictly to raise awareness and emphasize the importance of cybersecurity training. 

As per their dark web blogsite, ransomware group Snatch has identified Chattanooga State Community College as a potential target for attack.

As of the time of this writing, it is not yet clear what, if any, data was seized. No Phish Left Behind will continue to report on this breach as more information is corroborated.

In the meanwhile, if you, or anyone you know, attends this institution, we strongly recommend you reset all passwords and double-check all credit bureaus, credit cards, and bank accounts for any fraudulent activity. If you need any additional help with scam/breach response, please subscribe to Scalable's residential cybersecurity service for access to our 24/7 help line.

Cybersecurity is conceptually a lot like physical security: We can install all the locks and gates in the world, but if the security guard falls asleep with the door unlocked, anyone can get in. Similarly, if headquarters is fully protected, but staff are allowed to access sensitive data, applications, and passwords from less secure personal devices, the system cracks.

The defensive systems need to be coupled with a culture of security and awareness in order to really be effective.

Here are some steps business owners and leaders can take within your own organizations to significantly reduce the likelihood of a breach:

  1. Ensure sensitive data and systems are adequately firewalled and only accessible by authorized personnel, systems, and vendors.
  2. Ensure the use of multi-factor authentication for all critical systems.
  3. Employ the Principle of Least Privilege.
  4. Require complex passwords with regular expiration dates - vendor passwords and accesses included.
  5. Ensure remote staff are properly trained on systems access and cybersecurity best practices.
  6. Provide your people with continuing cybersecurity education, especially as technology continues to rapidly evolve.
  7. Create and maintain a culture of security.
  8. Ensure all systems are fully patched and protected with a managed antivirus solution.

As always, please contact Scalable Business Technologies at any time for assistance and be sure to attend our next Academy workshop.