The first things you will notice when entering Montgomery Colleges Cybersecurity Center and Lab are the large video panels around the room that show a steady stream of cyberattacks represented by lines connecting attackers and targets on a world map. The displays show known cyberattacks, which are instantly blocked. It can be mesmerizing just watching the maps activity, with attacks touching almost every part of the world, until you remember that each is an attempt to commit theft, fraud or another crime.
The scope of the global attack is sobering to think about, and I am thankful for the cybersecurity professionals who work to protect us all. Many of the students who train in our lab will become cybersecurity pros themselves. Some come to us to enhance their existing skills and go on to the thousands of available computer and cybersecurity career opportunities in government and industry. We need every one of them.
Of course, these criminal endeavors never stop. Despite our diligent focus on security and protecting our assets, in September of 2019 Montgomery College fell victim to an internet fraud committed by criminals outside the college. They stole funds totaling $2.8million by routing them to a fraudulent bank account. The fraud was discovered quickly, and we took immediate steps to recover the funds. We have recovered 39percent, resulting in a net loss of $1.7million. A year later, we remain hopeful yet realistic about the possibility of recovering more of the stolen money.
As you might expect, it was initially disconcerting to know that we were victimized in a fraud scheme. It is an intrusion, albeit an electronic one, but an intrusion nonetheless. It is like realizing a stranger has broken into your home. The initial shock of the crime fades quickly, you discover how the criminal took advantage and you take every step to catch the perpetrator and prevent it from happening again.
Knowing that criminals frequently target colleges and universities through similar fraud and other schemes offered some consolation, but not much.
We immediately chose to be as clear and open as we could about the fraud, and I am gratified by the responsiveness and support weve received. Our full cooperation with the investigating authorities required that we keep some details of the crime under wraps, but we otherwise had straightforward conversations with the Montgomery College community, our state and county leaders, our accreditors at the Middle States Commission on Higher Education, journalists, and other stakeholders about the fraud scheme. Our transparency and forthrightness about what happened was always rewarded with cooperation, assistance and advice.
Our most important message in the immediate aftermath of the crime was to assure our students, faculty members and staff members that the fraud scheme would not adversely affect their studies and work or the colleges financial strength. While a significant amount of money was stolen, our educational mission continued without fail. The net loss amounted to about one-half of 1percent of our operating budget. We recognized the loss in our financial statements for the fiscal year ended June30, 2020, and we received an unmodified opinion from our auditors for the year, the highest level possible. Whats more, we earned an Aa3 Stable rating from Moodys Investor Service, a testament to our long-standing conservative financial management philosophy.
Learning from the Incident
Naturally, we all wanted to know how this could have happened, even though our employees had followed strict internal financial controls. Security experts remind us that criminals are continually inventing new ways to commit their internet crimes. The steps we take to safeguard ourselves today will soon be met with new criminal threats. So, in addition to working with the FBI, local law enforcement authorities and the Montgomery County inspector general, we conducted a rigorous internal investigation to learn from the incident. We also commissioned an external accounting firm to conduct a special audit of our financial controls, contract administration and vendor relationships. As a result, we have implemented several new controls to further secure our assets, data and operations.
A big part of our response has been to increase the training of our employees. To stay ahead of the criminals, the training program is ongoing and regularly updated. Any employee who approves an invoice payment, manages a vendor or administers a contract needs to know how to spot a scam. To date, more than 2,000 of our employees have participated in the training that will improve their ability to detect potential fraud.
Our response to the fraud scheme also benefited from having the expertise of our Office of Compliance, Risk and Ethics. We formally established the office nine years ago to help us identify and prioritize internal and external risks and threats. The offices expertise includes an internal auditor dedicated to improving financial controls and responding to new threats. I am thankful to these Montgomery College professionals and others in finance, procurement, information technology and additional areas for their dedication to safeguarding us.
As prepared as any institution can be for this kind of fraud attack, you can always do more. Some lessons we learned from our experience might be useful to other institutions in preventing a fraud scam or responding to one should it occur.
To prevent a criminal attack:
To respond to a criminal attack:
I have to admit that it is a bit humbling that we at Montgomery College, with our respected track record of preparing so many students for successful careers in cybersecurity and fighting internet fraud attacks, have ourselves been victims of such a crime. Yet this experience has taught us that, even with sophisticated fraud-prevention measures in place, we were still vulnerable. Institutions must continually advance their defenses to protect themselves. Weve also learned that our instinct to respond with transparency was correct, and we benefited from the support of our colleagues and community.
The next time I visit our cybersecurity lab, I will have an even greater appreciation for the enormity of the criminal threats we face every day -- and the confidence to know that we are employing all the safeguards we can so that the flurry of criminal activity on the labs screens has nothing to do with us.
- Cyber security and the Internet of Things - Lexology - November 16th, 2020
- Save over $6,400 off this Complete InfoSec & Business Continuity Bundle - Neowin - November 16th, 2020
- Official Government Cybersecurity Guidance Offers Six Focus Areas for Banks of All Sizes - Lexology - November 16th, 2020
- Internet Security Audit Market is Expected to Exhibit an Upward Growth Trend Across Widespread Verticals | Affluence - The Think Curiouser - November 16th, 2020
- Internet Of Things Security Market 2020: Global Opportunities, Regional Overview, Top Leaders, Size, Revenue and Forecast up to 2020 2026 - The Daily... - November 16th, 2020
- Internet of Things (IoT) Security Technology Market Size 2020 | Opportunities, Regional Overview, Top Leaders, Revenue and Forecast to 2027 -... - November 16th, 2020
- 6 security shortcomings that COVID-19 exposed - CSO Online - November 16th, 2020
- iboss Named Finalist for Best Network Security Solution in the 2020 ASTORS Homeland Security Awards - PR Web - November 16th, 2020
- Microsoft: Move Away From Phone-based Multi-factor Authentication - TechDecisions - November 16th, 2020
- Global Cable Operator Markets, 2020-2025 by Technology, Residential Services (Wireless, Internet, Entertainment, Security, Home Automation, and IoT... - November 16th, 2020
- Why fintech security must never be an afterthought Wall Street Call - Reported Times - November 16th, 2020
- Global Internet Security Market Share, Quantitative Analysis, Drivers & Restraints, Future Trends and Forecast Research Report 2026 by Global... - November 10th, 2020
- Internet Security Software Market Size, Share, Types, Products, Trends, Growth, Applications and Forecast 2020 to 2027 - TechnoWeekly - November 10th, 2020
- How the Internet of Things Security Infrastructure in India can be improved? - Analytics Insight - November 10th, 2020
- Global Internet of Things Security Market 2025 Potential Scope for Growth in This Pandamic: Check Point Security Software Technologies, Cisco Systems,... - November 10th, 2020
- What is a RAT? How remote access Trojans became a major threat - CSO Online - November 10th, 2020
- China's largest hackathon sees Windows 10, iOS 14, Chrome, and more hacked - TechSpot - November 10th, 2020
- How governments, companies can address evolving needs of increasing tech-savvy Filipinos - Philstar.com - November 10th, 2020
- Global IT Security Market 2020 Growth Potential, Production, Revenue And COVID-19 Impact Analysis 2025 - The Think Curiouser - November 10th, 2020
- Internet of Things (IoT) Security Market Will Generate Massive Revenue In Future A Comprehensive Study On Key Players - TechnoWeekly - November 10th, 2020
- Global Internet Security Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top Companies:... - November 8th, 2020
- Misinformation, not vote tampering, is our most critical election threat - SecurityInfoWatch - November 8th, 2020
- Top 7 Ways to Hide Your IP Address in 2021 - Techstory - November 8th, 2020
- Internet Security Software Market Current and Future Trends, Leading Players, Industry Segments and Regional Forecast By 2029 - Eurowire - November 6th, 2020
- Know Your Role: You Are Part of the Security Team - ClearanceJobs - ClearanceJobs - November 6th, 2020
- 'This is how it was all supposed to work': The EI-ISAC readies for Election Day - StateScoop - November 6th, 2020
- Two reasons your Wi-Fi is slow, and how to fix them - CNET - November 6th, 2020
- Keeping Yourself Safe on the Internet at University - TechBullion - November 6th, 2020
- IT Security Spending in Government Market Expected to Flourish By 2025 with Top Key Players- IT Security Spending in Government are: Check Point... - November 6th, 2020
- Arson, water damage: Paper ballots are fragile. But there's a reason we don't vote online - CNET - November 6th, 2020
- Live News Streaming Figures for #Election2020 Highlight Misinformation Threat - Infosecurity Magazine - November 6th, 2020
- Florida Invests in Security Controls Ahead of #Election2020 - Infosecurity Magazine - November 6th, 2020
- How to Organize Employees to Cooperate in Threat Mitigation - Infosecurity Magazine - November 6th, 2020
- The best antivirus protection for Windows 10 in 2020 - CNET - November 2nd, 2020
- Internet Security Firewall Market to Reap Excessive Revenues by 2020-2029 - Eurowire - November 2nd, 2020
- Global Internet Security Market Expected to reach highest CAGR in forecast period :HPE, IBM, Intel, Symantec, AlienVault - TechnoWeekly - November 2nd, 2020
- Poll shows that many feel more vulnerable to online threats during the pandemic - Wiltshire 999s - November 2nd, 2020
- Internet of Things (IoT) Security Market To Witness Significant Growth By 2020-2028 - TechnoWeekly - November 2nd, 2020
- Post-2020 election, Covid vaccine is biggest disinformation threat on the internet: Former Facebook security chief - CNBC - November 2nd, 2020
- Internet of Things (IoT) Security Market Demand (2020-2026) | Covering Products, Financial Information, Developments, Swot Analysis And Strategies |... - November 2nd, 2020
- Career in cybersecurity or ethical hacking: Where to study, starting salary and job interview questions - India Today - November 2nd, 2020
- Internet Of Everything (IoE) Market Status and Trend: Top Key Players, Industry Dynamics, And Regional Scope 2020 - Aerospace Journal - November 2nd, 2020
- Security Pros Have Role in Combatting Disinformation - Infosecurity Magazine - November 2nd, 2020
- How Safe Is the US Election from Hacking? - The New York Review of Books - November 2nd, 2020
- Internet watchdog warns of rise in scammers' activity - New Zealand Herald - November 2nd, 2020
- Homeland Security notified after hackers leak names of local residents who reportedly submitted invalid ballots - iFIBER One News - November 2nd, 2020
- Global Internet of Things Security Market Expected to reach highest CAGR in forecast period :Check Point Security Software Technologies, Cisco... - November 2nd, 2020
- Network Security: Don't Trust And Verify - IT Jungle - October 23rd, 2020
- Akamai Reveals State of Internet: Threats to Retailers - Solutions Review - October 23rd, 2020
- Verisign Reports Third Quarter 2020 Results | Business | The Daily News - Galveston County Daily News - October 23rd, 2020
- Global Internet Security Software Market Analysis, Drivers, Restraints, Opportunities, Threats, Trends, Applications, And Growth Forecast To (2026). -... - October 23rd, 2020
- Nokia Threat Intelligence Report warns of rising cyberattacks on internet-connected devices - GlobeNewswire - October 23rd, 2020
- Cybersecurity and a potential Biden White House: Past tech priorities resurrected - SC Magazine - October 23rd, 2020
- Virgin Media has an important new feature, but switching it on will cost you - Express - October 23rd, 2020
- WISeKey and OpSec Security Partnership Establishes Trust Between Brands and their Customers through Improved Customer Engagement - GlobeNewswire - October 23rd, 2020
- Internet Of Things Iot Security Market Economic Perspective And Forecast To 2027 - PRnews Leader - October 23rd, 2020
- Why cybercriminals have 'Gone Vishing' during the COVID-19 Pandemic - Bdaily - October 23rd, 2020
- Insights on the Digital Security Control Global Market to 2027 - Strategic Recommendations for New Entrants - GlobeNewswire - October 17th, 2020
- More than 25% of Cypriots concerned about internet security - Cyprus Mail - October 17th, 2020
- 5 things you can do to secure your home office without hiring an expert - We Live Security - October 17th, 2020
- Beyond Speed and Reliability: Security Is a New Differentiator - Security Boulevard - October 17th, 2020
- Nationwide and Generali Global Assistance Partner to Enhance Identity Theft Protection - Insurance News Net - October 17th, 2020
- Global Internet of Things (IoT) Security Product Market 2020 Impact of COVID-19, Future Growth Analysis and Challenges | Cisco Systems, Inc, IBM... - October 17th, 2020
- Is BlackBerry (TSX:BB) Stock a Buy on the Latest News? - The Motley Fool Canada - October 17th, 2020
- Global Internet of Things or IoT Security Market to Reach $22 Billion+ Valuation by 2027, Largely Due to Blockchain Adoption - Crowdfund Insider - October 17th, 2020
- Internet Security Market with COVID-19 Recovery Analysis 2020 | Rapid Adoption of BYOD Policy to Boost Market Growth | Technavio - Business Wire - October 8th, 2020
- Tenable and the CIS Enter Partnership to Bolster Cyber Hygiene - AiThority - October 8th, 2020
- How to Build Smart Banks that Connect Customers with Modern DX - AiThority - October 8th, 2020
- #NCSAM: Is Connected Ever Going to be Protected? - Infosecurity Magazine - October 8th, 2020
- Cyber Security Awareness Month is here! - We Live Security - October 2nd, 2020
- Internet security Market Potential Growth, Size, Share, Demand and Analysis of Key Players Research Forecasts to 2027 - The Daily Chronicle - October 2nd, 2020
- Latest Report on Global Internet of Things (IoT) Security Market Analysis, Growth, Opportunity and Regional Insights 2026 - The Daily Chronicle - October 2nd, 2020
- Remarks by Henrietta Fore, UNICEF Executive Director, at Security Council meeting on universal connectivity & access to digital technology in... - October 2nd, 2020
- COVID-19 Update: Global Internet Security Audit Market is Expected to Grow at a Healthy CAGR with Top players: Symantec, Intel Security, IBM, Cisco,... - October 2nd, 2020
- Internet Security Market 2020: Potential growth, attractive valuation make it is a long-term investment | Know the COVID19 Impact | Top Players: HPE,... - September 30th, 2020
- The Top Internet of Things (IoT) Authentication Methods and Options - Security Boulevard - September 30th, 2020
- How Trusted Internet Connections Is Focusing Telework with TIC 3.0 - FedTech Magazine - September 30th, 2020
- Is your business looking for an extra layer of security - here's why a VPN may be the answer - TechRadar - September 30th, 2020
- A business connected to the cloud needs cloud-ready security, connectivity - Techgoondu - September 30th, 2020
- The 6 key races you haven't heard of that may help decide how we secure our elections - POLITICO - September 30th, 2020