DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NYS Comptroller Audit: North Tonawanda City School District – Information Technology (2023M-102)

Posted on December 2, 2023 by Dissent

NYS Comptroller Thomas DiNapoli recently released an audit of the North Tonawanda City School District. Summary:

Issued Date: November 03, 2023<
[Read complete report – pdf]

Audit Objective

Determine whether North Tonawanda City School District (District) officials properly secured user account access to the network and managed user account permissions in financial and student information applications.

Key Findings

District officials properly managed user account permissions in the financial application but did not properly secure user account access to the network or manage user account permissions in the student information application. As a result, there is a significant risk that network resources and student information could be inappropriately altered, accessed or used. In addition to sensitive information technology (IT) control weaknesses that were communicated confidentially to officials, we found that District officials did not:

  • Disable 246 unnecessary network user accounts.
  • Properly manage permissions for 517 user accounts in the student information application by ensuring accounts were locked or disabled when an employee separated from the District.
  • Educate users on data privacy and security awareness.
  • Develop an IT contingency plan and as a result, District officials lacked preparedness for a cyberattack.

Key Recommendations

  • Ensure that unnecessary network user accounts are disabled as soon as they are no longer needed.
  • Ensure user accounts in the student information application are locked or disabled when the employee separates from the District.

District officials agreed with our recommendations and indicated that they have initiated or plan to initiate corrective action.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Commentaries and AnalysesEducation SectorU.S.

Post navigation

← NYS Comptroller Audit: Brentwood Union Free School District – Information Technology (2023M-83)
Paris Criminal Court Dismissed Charges Against Platypus Hackers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.