DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TN: County Schools Testing Disrupted By Suspected Hacking of Questar

Posted on April 21, 2018 by Dissent

Eugenia Estes reports:

Annual state-mandated assessment testing did not get off to the best start this week for many systems, including Greene County Schools, due to what is being investigated as a cyber attack on the company that handles online TN Ready testing for the state.

Although there were some disruptions to the testing for some students in Greene County Schools on Monday and Tuesday, testing did continue and students were able to finish their exams, according to Julia Lamons, data supervisor for the district.

Read the full report on Greenville Sun.

Regular readers may recall that Questar was mentioned on this site earlier this year when they had a breach that affected a number of schools in Mississippi and New York. Although it has not been confirmed that Questar was attacked this past week, from the reporting on the Greenville Sun, it does sound like it is likely.

Update:  So, it’s more than just Tennessee, it seems. I’m still getting caught up with news, but it appears that seven states may have been impacted, including New York, South Dakota, Mississippi,  and Missouri. Two other states were not as “negatively affected.”

So clearly there needs to be a deep investigation into what happened and how the vendor can prevent a recurrence of the problem.

Category: Education SectorHackSubcontractor

Post navigation

← Welcome new readers from Seton Hall Law
Ca: 1,100 Hamilton residents’ emails compromised following data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news
  • Tonga’s health system hit by cyberattack
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.