The HECVAT (Higher Education Community Vendor Assessment Toolkit) was developed by the Higher Education Information Security Council (HEISC) as an initiative to help higher education institutions better protect their data, prevent the risk of data breaches, and measure the cyber risk of third-party solution providers. HECVAT provides a standardized template that schools can use to perform risk assessments and risk management processes concerning sensitive data and personally identifiable information (PII).
More than 150 colleges and universities use the HECVAT assessment tool to identify vulnerabilities and improve data protection policies. Third-party providers also use HECVAT to demonstrate their compliance with HECVAT standards and commitment to practicing strong data security.
Although HECVAT is designed to help schools with information security and is not enforced by law, meeting HECVAT requirements can help schools comply with other standards such as SOX, SOC 2, HIPAA, PCI DSS, and more. This article will examine the most common violations of HECVAT standards and how the education sector can avoid them.
HECVAT is important because cybercriminals target the education sector at a much higher rate than many other industries. Many colleges and universities have poor security awareness and often have little to no cybersecurity policies in place. The lack of preparation and knowledge puts schools at severe risk of being attacked and having important data stolen or compromised.
A 2018 study found that in the US, the education sector was the least secure of 17 major industries, with application security and network security among the major issues. Kevin Moroney, Vice Provost for Information Technology at Pennsylvania State University, stated that the university faced around 20 million daily attacks, which was typical for a research university. A 2016 study of 20,000 organizations found that higher education had the most ransomware incidents compared to every other sector, including healthcare, which is regulated by HIPAA.
Cybercriminals targeting higher education seek out valuable student PII, such as contact information and credit card details, student loan information, staff employment records, research projects, and confidential infrastructural planning.
Here are the most common reasons why criminals and hackers target higher education schools:
Although HECVAT is not currently mandated by federal law as other industry based frameworks are (such as HIPAA or GLBA), schools or their third parties that are in violation of HECVAT agreements risk damaging their business and profession reputations.
Higher education is not currently legally obligated to report all cyber incidents. EDUCAUSE, however, is monitoring this situation. It’s likely that higher education will soon face similar requirements to other sectors, such as the healthcare sector with HIPAA.
The Cybersecurity and Infrastructure Security Agency (CISA) is proposing higher education institutions report certain ransomware payments within 24 hours and cybersecurity incidents within 72 hours. If this becomes law, it will take place via the Cyber Incident Reporting for Critical Infrastructure Act 2022 (CIRCIA).
The most common HECVAT violations are as follows:
When it comes to third parties, many colleges and universities lack adequate security measures, which is the main component of HECVAT compliance standards. Failing to secure third-party vendors or business partners poses an extreme risk to a school’s overall security posture, and a single breach from a third party could compromise the entire school system along with its other vendors.
The HECVAT framework is specifically designed to manage third-party vendors, who often need complete access and handle critical data. HECVAT is a great framework for schools to use as a roadmap to better third-party security (along with other popular frameworks such as NIST or ISO 27001).
Schools must implement minimum security requirements for their vendors and require third parties to meet all checklist items during the procurement process to satisfy the risk appetite or tolerance. Additionally, schools must also establish a process that continues to monitor vendor security and track their progress over time. By doing so, these higher education schools provide themselves a way to measure vendor criticality and better manage vendor relationship.
However, with potentially hundreds or thousands of vendors that a school may work with, the vendor management process can be especially time and resource-consuming. One solution for this is to employ a third-party risk management service, such as UpGuard Vendor Risk.
Third-party risk management tools like UpGuard allow schools to gain an executive overview over the entirety of their vendor lists. They can track if a vendor has failed to uphold their security standards, track compliance with various frameworks and regulations, quickly detect security breaches, build remediation workflows, and automate the HECVAT questionnaire process.
Human error plays a significant part in 95% of cybersecurity breaches. The key is to understand the different types of human error and develop policies and procedures around those errors that help minimize the risk and prevent future occurrences. HECVAT helps provide a framework that should help schools gain a better understanding of the cyber risks involved.
There are two main types of human error: judgment and skill-based errors. In the first case, a staff member may make a mistake while performing a familiar task due to a lapse of judgment or concentration. A skill-based error is when someone performs an action that leads to a data breach because they failed to understand the security risks, whether from a lack of education or training.
To reduce human error, higher education needs to:
These steps need to be a part of the school’s written cybersecurity policy and threat response plan. Training is a critical component in reducing human error. Understanding PII and the need for authentication leads to appreciating why and how data protection helps educational institutions.
When a phishing attack occurs, it’s imperative to act quickly. To do this, higher ed institutions need up-to-date security policies and procedures in the event of a data breach. It is also necessary to have appointed a Chief Information Security Officer (CISO) to lead information security and coordinate efforts to recover data and mitigate the effects of cyber attacks. This can make security incident response faster and more effective.
In addition to clear, written details regarding disposal methods, there is also a need for rules about who has access to data and who has the authority to dispose of it. Staff needs training to ensure that sensitive or confidential data is destroyed with no chance of recovery, including the sensitive data of third-party cloud services. Higher ed institutions must hold third-party providers to rigorous security standards to ensure their compliance with HEVCAT and keep their staff and students secure.
IT security systems can help hold the line and keep data safe. These include firewalls and access controls to monitor who has access to private data, for what purpose, and when.
A username and password system is among the most common ways for organizations to restrict access to mission-critical or personal data. While they may be considered the weakest link in terms of authentication, they can help maintain data protection and information security.
Too often, data is left unprotected by passwords, or passwords are weak and easy to crack. Failure to maintain a proper password policy and procedures could lead to a lower score in the “Authentication, Authorization, and Accounting” part of the HECVAT questionnaire.
In other cases, credentials could be found on the dark web due to a data leak. If any threat actor purchases this information, they can easily access a school’s internal systems without having to use any hacking methods. If successful, an attacker targeting access credentials may steal, modify, or destroy data. The criminal may aim to lurk in the system over time to perform any or all of these actions.
The institution must implement clear policies on setting strong passwords and changing them after the appropriate life cycle. Passwords such as “123456” and “password” are among the most commonly used passwords in 2022, but also amongest the weakest and easiest to guess. Password managers are a great option for employees that easily forget their passwords or tend to lose their login information.
As part of a regular security audit, schools also need to review employee access permissions to prevent significant lateral movement should a cybercriminals gain unauthorized access to compromised accounts. Limiting employee access privileges to only the data that they need is one example of how a school can contain and control a future breach.
The institution must also monitor its access privileges and ensure permissions are up to date. For example, Memorial Health Care System received a $5.5 million fine in 2017 for a data breach concerning electronic protected health information (ePHI) affecting 110,000 people. The breach took place because Memorial did not remove a former employee’s login credentials, and over a dozen employees continued to use the old login to access sensitive information for a year.
Application security refers to any techniques - whether procedural, software, or physical - used to protect computer applications from external security threats. To a large extent, developers enhance application security during the application’s development stage.
However, application security takes place largely after the software is in circulation. With applications released at a far higher rate than previous years, securing them has become a arduous process to ensure they stay safe in the face of developing threats.
As threats continue to evolve, application security must also evolve. Checking for applications’ security flaws is an essential part of maintaining security when challenged by multiple ways of communicating, connecting, and sharing data, not least of all with SaaS (software-as-a-service) and other cloud services.
To be fully HECVAT compliant, it’s necessary to perform proper risk assessments to highlight areas that may be vulnerable to hacking.
A firewall is an excellent example of a software security control that can vastly improve application security and prevent or minimize infiltration by an external threat. Properly router configuration would also be a hardware security control that helps increase an institution’s security by masking the IP addresses of network devices.
Antivirus and anti-malware applications also improve application security and can help detect malicious files before they corrupt a system. They can provide a helpful security management system with comprehensive databases, monitoring functionality, event log retention, real-time metrics, and the ability to automate responses to potential threats. With the oft-included spyware detection and removal tools, they can significantly help ensure the safety and integrity of data.
A higher education institution with an adequate IT budget could implement all these measures to solve application security and hacking issues. Understanding these techniques can help the institution use HECVAT to vet existing or future third-party cloud providers.
Threat detection tools can be useful when partnering with third parties or allowing access to remote workers. They allow external network environments to be examined, providing information about misused trust relationships and potential threats.
In the event of a data breach or an attack, higher education establishments can face numerous costs, damages, and fallout associated with their poor security practices or lack of vendor risk management processes.
Although HECVAT is not currently mandated by law, security breaches resulting from HECVAT violations can lead to fines from other regulatory standards and laws. Additionally, victims can also sue schools and vendors for violation of data privacy if they fail to adequately secure important data. A 2018 study identified that class action lawsuits against universities after data breaches were increasingly frequent.
It is no longer necessary for the plaintiff to demonstrate “actual or imminent harm” due to the data breach. This means that people can sue an organization, even if the exposure of their data does not directly lead to identity theft. The “substantial risk of future injury” may be enough for a claim. This could mean hefty financial penalties for colleges and universities failing to protect sensitive data.
Find out how higher education schools can better manage their vendor security risks.
Higher ed institutions must also consider the potential cost of reputational damage that a data breach or cyber attack can cause. A university’s reputation can suffer for years after an attack, particularly if the response is not prompt or effective. A damaged reputation can also affect enrollment numbers for the following years.
According to a 2020 Sophos survey, the cost of resolving a cyber attack in higher education averages about $2.7 million per incident. This figure includes the cost of downtime, repairing devices and networks, recovering data, updating security, and paying ransomers. The cost of remediation after such an attack is almost double the average across all sectors.
The maximum score after completing all sections of the full HECVAT questionnaire is 2660. A good HECVAT score, therefore, is anything above 2400 or 90%.
The minimum acceptable score for a third-party vendor taking the HECVAT questionnaire is 70%. However, even with a minimum allowable score, the higher education institution will mostly likely conduct follow-up interviews or consider other vendors before entering into a partnership.
A score below 70% means that the third-party vendor is not fulfilling several important conditions of the HECVAT standard.
Higher ed institutions can use the Cloud Broker Index (CBI) to see a list of vendors that have already completed the HECVAT evaluation successfully. Also known as the Community Broker Index, this list can help HE institutions evaluate potential third-party solution providers and speed up the assessment process.
Both the full HECVAT toolkit and the HECVAT Lite tool for expedited security assessment include a documentation section to demonstrate what the company has done to certify its security strategy and a safeguards section grouped by the following categories: