SchoolInsight Data Security Practices
1/20/2025
It’s been widely reported that a popular SIS vendor experienced a security breach. Though we’re not associated with that vendor, and our system did not experience a breach, many of our customers have asked about our security practices. They have a legitimate interest in how vendors manage their data. To ease communication, we’re publishing this article outlining what we believe happened and how we secure your data.
Across EdTech, cyber crime is on the rise. Criminals are targeting vendors and school districts alike. As a small vendor, we consider a breach to be an existential threat to the company. So we take it very seriously, and have made significant investments to avoid breaches of our systems.
Before we discuss our practices, we’d like to review the incident as we understand it. From what we’ve read in the news, it sounds like the SIS vendor gave maintenance credentials to a third party, allowing them to access many customer systems and associated data in the performance of their role. Those credentials did not require multi factor authentication (MFA) and did not expire. Allegedly those credentials became compromised and were used by a cyber criminal to access, and eventually download, data stored in the system.
Before we discuss our general practices, we’d like to state that we do not give system credentials to third parties. Also all of our employees are required to use MFA to access our system. As a result, this attack vector is not one to which we’re likely vulnerable.
That doesn’t mean we can’t be the victim of a successful attack. Storing data on the internet has inherent risks. We do however take steps to reduce that risk as much as possible, but unfortunately it cannot be eliminated.
Here are some of the practices we have in place:
While we already conform to industry best-practices, we’re conducting an internal audit to identify any gaps.
In addition to the steps we take, we encourage each district to take actions to mitigate their own risk. These include:
There is a natural trade-off between security and convenience. While these steps can make the site more complex or more challenging to use, they are necessary to ensure data security.
As always, if you have any questions or concerns, feel encouraged to reach out to our support team.
The Common Goal Team