Children make a sign in the UK’s cybersecurity, not the way their parents want. According to the country’s information commissioner office (ICO), students were behind more than half of personal data violations in schools.
in warning For teachers and educational institutions, ICO set its analysis of 215 reports of data breach of security incidents arising from internal schools, and found that 57 % of the breakthroughs were withdrawn by students.
Nearly a third of the violations were made possible because students guessed the passwords are common, or the login details were found down, for all ICO.
However, ICO has said that a small number of accidents (5 %) requires more advanced techniques to bypass security and network control elements. The organizer gave an example of how students penetrated for a period of three years 11 for the school’s student information system using tools to break passwords and bypass security protocols; Even two students admitted that they are part of a Piracy Forum.
“Children penetrate their school’s computer systems – and they may prepare them for the life of electronic crime,” the report says.
The warning goes on to say that reputation, money, revenge, and competitions are among the reasons that make children say they penetrate the systems.
“What begins with dirt, a challenge, some fun in a school environment can ultimately lead to harmful attacks on critical organizations or infrastructure,” Heather Tommy, the ICO major Internet specialist, said in a statement.
The report dismantled more light on how these violations occurred: nearly a quarter of data violations have benefited from weak data protection practices such as teachers who allow students to use their devices; 20 % of breakthroughs are caused by employees who use personal devices for work; 17 % of violations occurred due to the improper control of arrival to systems like Microsoft SharePoint.
Calling the results of “anxiety”, urged ICO schools to help address these issues by updating the GDP training, improving cyber security practices, protecting data, and reporting violations on time.
https://techcrunch.com/wp-content/uploads/2025/09/GettyImages-179543227.jpg?resize=1200,1200
Source link