‘Tis The Season for The Gift That Keeps on Taking

Bill Balint • December 6, 2024

‘Tis the season for hustling and bustling, while also (hopefully) watching the bottom line along with the inevitable waiting lines at the checkout.


For those in education writing ‘the big checks’ – perhaps with careers in addition to dollars – the costliest lump of coal in the stocking might just be a data breach at their institution.


What those of us in the industry hear and read on the financial side of data breaches is downright scary and even stretch the bounds of legitimacy. Counting on Mr. Scrooge to help with a donation is not an ideal strategy!


Questions like the following seem to be on the rise, including “Are these numbers real or just a scare tactic from the cybersecurity sector?”, “How do these so-called experts really know what it costs?”, “What happens if the institution simply cannot afford the cost?”, and “These numbers cannot be correct for education where we are not some huge corporation with industry trade secrets and/or stockholders?”


Unfortunately, cyberattacks are ‘celebrating’ their 25th anniversary depending upon which historical reference is used, and it is a gift that keeps on taking with no end in sight.


First, it is unfortunate that a few institutions have paid the ultimate price, as did current and potentially future students either losing the gift of higher learning or - at best - having it interrupted, delayed and perhaps diminished.


One only needs to glance back at the tragic story of Lincoln College, which went from record student enrollment in 2019 to extinction in less than two years – closing at the conclusion of the 2021-22 academic year. Just a stunning, sad outcome.


According to the College’s official announcement, Lincoln “…was a victim of a cyberattack in December 2021 that thwarted admissions activities and hindered access to all institutional data…”. Lincoln further reported it took three months to fully restore the lifeblood of its information systems – recruitment, retention, and fundraising. Despite best efforts, a 157-year-old institution found itself with no viable option but to close its doors permanently.


According to the respected extensive annual research conducted by Ponemon Institute, contained in IBM’s 2024 Cost of a Data Breach Report, the price tag for those data breaches occurring from March 2023 through February 2024 at 604 impacted organizations spanning 17 industries and 16 countries reached an average of $4.88 million. This represents more than a $1 million average increase in four years. Unfortunately, the U.S. numbers are much worse at an average of $9.36 million.


Those seeking even a wisp of a silver lining can take comfort in the fact that education only ranked 15th of the 17 researched industries with a $3.5 million cost average across the 16 countries. The three primary components – detecting the breach in the first place, the revenue loss incurred due to the breach, and all the actions needed to resolve the breach – can each top $1 million.


So, what will the damage be if a data breach hits this campus?


The Ponemon analysis used activity-based costing – which assigns cost to each activity in an organization. This would include items such as the human and software costs incurred just to determine and investigate the breach, as well as the ensuing loss of revenue and reputation. The resources needed to recover from the cyberattack – bringing in third-party cybersecurity companies after the fact, sometimes paying ransom, maybe providing identity theft insurance, legal counsel fees, the entire public relations strain, and communicating with victims all take a bite from a very expensive pie. At least one state incident response law even includes a possible $750,000 fine.


What is often is overlooked is the potentially devastating loss in productivity by the many employees who find the institution’s IT environment to be their lifeblood – made worse of the breach happens at a critical time of year.


Every major breach reaction runs the risk of generating major financial penalties. As just one painful example, research found victims still paid ransom in 37 percent of cases when law enforcement was involved. Moreover, only 52 percent even involved law enforcement in the first place.


So, what practical, common-sense actions really exist?


A great place to start is engaging a true, trusted partner before a catastrophe occurs. A partner with a clear understanding of the rapidly evolving cybersecurity landscape from a higher education-specific perspective. One that recognizes the ‘enrollment cliff’ crisis, changing perceptions about the value of education, and the entire concept of openness and academic freedom that often poses unique challenges.


The Ponemon research reveals 26 factors either decreased or increased the total cost of the breach by at least $150,000 across all 17 industries and 16 countries. No institution can expect to find the right combination of investments and emphasis with so many factors at play.



Bill Balint is the owner of Haven Hill Services LLC, contracted as the Advisory CIO for Education at Trivigil.

By Mark McGinnis, Chief Evangelist, TriVigil October 7, 2025
For the last two years, as Cybersecurity Awareness Month returns, I find myself thinking less about firewalls and frameworks and more about people. Technology evolves. Threats evolve faster. But the heart of cybersecurity has always been human. The quiet decisions made every day by educators, administrators, and students determine whether our institutions remain safe or become headlines. And in education, where purpose runs deeper than profit, the stakes feel different. The New Reality of Risk in Education Over the past decade, education has transformed. Hybrid learning, connected devices, digital testing, and research collaboration have all expanded what it means to “protect the classroom.” But with that progress has come complexity, and complexity invites risk. Many schools and universities are now operating with sprawling technology ecosystems managed by small, overstretched teams. These professionals are trying to keep up with relentless change while defending systems that were never designed for today’s threat landscape. I’ve seen firsthand how easily a single vulnerability can cascade into real-world consequences: lost data, canceled classes, disrupted operations, and shaken trust. It’s never just a technical problem, it’s a human one. Awareness Is Not a Checkbox Every October, inboxes fill with reminders about cybersecurity awareness training. But genuine awareness does not come from compliance modules or quiz completions. It comes from culture. It begins when people feel ownership. When they understand why it matters, not just what to do. A district I worked with recently lost its long-time IT director unexpectedly. When the dust settled, leadership realized how much institutional knowledge had lived in one person’s head. It was not about negligence; it was about unseen vulnerability. That moment reminded me that awareness is not about assigning blame. It is about creating clarity. It is the point when leaders say, "We do not have to know everything, but we need to know where we stand." The Leadership Moment Cybersecurity has become a leadership issue, not just an IT issue. It is about creating space for uncomfortable conversations about risk, capacity, funding, and accountability. It is about understanding that every decision, from procurement to password policy, reflects values as much as priorities. The most secure campuses I have seen are not those with the most tools. They are the ones where people talk to each other. Where technology teams, faculty, and administrators work from a place of shared responsibility instead of silos and assumptions. That is not a technical investment. It is a leadership commitment. Awareness That Lasts Beyond October Cybersecurity Awareness Month is a good reminder to pay attention, but awareness can’t be seasonal. The real challenge is how we sustain it through the rest of the year: how we build systems and cultures that make security second nature, not second thought. For leaders in education, that means showing vulnerability. Admitting what we don’t know. Asking for help when we need it. Encouraging the same openness in our teams. It also means balancing mission and protection, ensuring that the drive to connect, innovate, and share knowledge never compromises the safety of those we serve. Closing Thought Cybersecurity is not about locking down learning. It is about preserving it. In every district, college, and university I have worked with, I see the same quiet determination: to keep moving forward despite the noise, the fatigue, and the fear. And that gives me hope. Because awareness is not built by rules or reminders. It is built by leaders who care enough to keep asking hard questions. As we navigate another Cybersecurity Awareness Month, that is where I choose to focus. Not on the threats that surround us, but on the responsibility that unites us.
By Bill Balint June 10, 2025
Higher Education IT professionals must be committed to taking care of others. After all, great IT organizations were never in the business of looking after computing but were always in the business of customer service. It is not about bits, bytes, clouds, anti-virus, border firewalls or even processing credit card payments online. The best IT organizations make it all about people. But we higher ed. IT people find ourselves in the middle of a disrupted industry and this disruption is not going away. In this case, it is not the disruption of GenAI, or data breaches run wild. Instead, it is about survival. The tragic Spring 2025 story of Limestone University in Gaffney, S.C. is yet another in a growing list of institutions no longer able to weather the ominous reality. Founded in 1845, 16 years before the Civil War erupted in Limestone’s home state, Limestone overcame every challenge of a small private institution for some 180 years. That is until April 29 when Limestone’s governing board officially announced its immediate closure. The announcement came after Limestone lost some 50 percent of its enrollment in the past decade, from about 3,200 students to 1,600. A large percentage of these are student athletes as the institution fielded 23 teams at the NCAA Division II level. The closure story is repeated often enough nationally that it sadly runs the risk of no longer being newsworthy. According to federal data provided to The Hechinger Report ( https://hechingerreport.org/tracking-college-closures/ ), 28 higher education institutions closed in the first nine (9) months of 2024 alone. What does this have to do with IT departments? Everything. From an IT perspective, many institutions rely on online learning, video conferencing, worker collaboration suites, CRMs, SaaS ERPs and SIS’, and comprehensive cybersecurity tools at levels that could not have even been dreamed about in the pre-COVID world. That’s not even addressing the emerging AI world, coupled with unfunded mandates from increasingly complex IT compliance requirements. More and more money is needed to attract and retain fewer and fewer potential students at many institutions and that IT budget may look like fertile ground. Not surprisingly, some view IT as a liability – like a very expensive utility bill – as higher education muddles through this dark time. Perhaps a necessary evil, but one that needs to operate as cheaply, as possible. True enough, IT brings significant expense money, and it generates very little direct revenue in most cases. The Good Ole’ Days of IT being directed to “do more with less” is being replaced with “we can do IT without you”. All of which leads back to the higher education IT professional and the mental health impact of this disruption that really dates to the 2008 recession when budgets and staffing levels took a negative turn from which some departments never recovered. Cybersecurity and data privacy professionals are arguably facing the highest stress levels in the organization. The Information Systems Audit and Control Association’s (ISACA) 2024 State of Cybersecurity survey report notes that 66 percent of cybersecurity staff believe their role is more stressful than it was five (5) years ago ( https://www.isaca.org/about-us/newsroom/press-releases/2024/nearly-two-thirds-of-cybersecurity-pros-say-job-stress-is-growing-according-to- new-isaca-research ). Though its focus is on the higher education ecosystem in general, 2025 EDUCAUSE Horizon Action Plan: Mental Health Supports ( https://library.educause.edu/-/media/files/library/2025/1/2025horizonactionplanmentalhealth.pdf ) offers some practical, common sense and sustainable tips for the IT professional, their team, the IT organization, and beyond, to help. Like most things in an IT organization, leadership – or lack thereof – is a key difference maker. A subtle action by a leader to prioritize staff mental health similar to the department’s larger goals of professional development, productivity gains or continuous improvement will make all goals easier to achieve. It is well established that mental health wellness leads to less workplace tension, better employee retention, and less time missed due to illness. But it is also simply the right thing to do because the disruption is disrupting IT employees like never before and it seems like the disruption is here to stay. Bill Balint is the owner of Haven Hill Services LLC, contracted as TriVigil’s Advisory CIO for Education.
By Bill Balint April 30, 2025
In a higher education world where cybersecurity, data protection and data privacy activities are bathed in multiple regulations, policies, procedures, standards and all the rest, what happens when victims claim, “compliance is just not good enough”? The answer can be quite costly. The March 2025 data breach incident at the Yale New Haven Health System (https://www.ynhhs.org/legal-notices) could potentially be such a case. Yale New Haven Health reported a data breach incident to the public on March 11, 2025, and a pair of 52-page federal lawsuits were filed on behalf of victims were already filed just over a month later. There are reports that as many as six additional suits were filed in the following days. A variety of law firms have created web pages where victims can seek legal engagement, so the number of suits could potentially increase. It does not appear Yale New Haven Health is being accused of specifically failing to meet a given governmental regulation – such as HIPAA, PCI, GLBA, or a state breach notification law. The fact that a generic notification letter about the incident can be found at the Massachusetts Office of the Attorney General website implies at least that state’s requirements have been met. But according to the Hartford Business Journal (https://www.hartfordbusiness.com/article/yale- new-haven-health-faces-lawsuits-over-data-breach-health-system-discloses-more-details), the suit claims Yale New Haven Health did not “…properly secure and safeguard Plaintiff ’s and Class Members’ sensitive personally identifiable information (PII) and personal health information (PHI), which, as a result, is now in criminal cyberthieves’ possession.” These lawsuits understandably infer that provider storing sensitive or confidential customer needs to use a portion of its revenue to fund customer data protection measures. The goal should be protecting data even beyond regulatory compliance demands. A Big Year For Settlements Beyond the question of governmental regulations and their relationship to lawsuits, there is no doubt higher education is suffering increased direct financial penalties resulting from data breaches. Just one example from 2025 is the $2 million settlement of the class action data breach lawsuit against St. Louis University and SSM Health Saint Louis University Hospital from mid-April, stemming from the data breach of up to 93,000 individuals (https://www.hipaajournal.com/saint- louis-university-data-breach-lawsuit-settlement/). Besides the common practice of receiving identity theft protection benefits, claimants can receive up to $2,500 in unreimbursed expenses resulting from the breach. St. Louis University and SSM Health Saint Louis University Hospital are not alone, as various similar suits are on schedule to be settled later in 2025. Large or small, public or private, no institution appears immune. Too Early? Too Late? Another new lawsuit is among those that confront the long-debated ”time to notify the victims” issue. Michael Harris, a potential incoming student at Lee University, filed the suit against Lee in the U.S. District Court Eastern District of Tennessee (https://www.local3news.com/local-news/lee-university-sued-for-negligence-after-data-breach-impacts-thousands/article_ca5ecb44- 8872-4692-9dd8-4ce35defe574.html). The lawsuit includes multiple complaints, among them is the claim that Lee waited for more than one year to notify the impacted individuals. One could argue notifying potential victims before all facts are known runs the risk of providing incomplete information. But waiting for an investigation to complete runs the risk of victims suffering the consequences of the breach without even knowing a breach of their information occurred. Damage Over Dollars? Of course, data breaches are often about a lot more than money. They hold the potential to devastate victims by inflicting non-economic temporary and sometimes even permanent damage. The recent takeover of the New York University (NYU) website by a hacker who briefly exposed NYU applicant information datasets back to 1989 (https://nyunews.com/news/2025/04/01/nyu-data-breach-lawsuits/) serves as a reminder. Public policy – often via regulation – tries to limit the damage by requiring those who house sensitive and confidential data adhere to strict standards. But higher education institutions need to know that compliance with all regulations and data breach laws might not be enough. These large settlements should provide institutions with a constant reminder. Bill Balint is the owner of Haven Hill Services LLC, contracted as Trivigil’s Advisory CIO for Education.