Cybersecurity Compliance is Only Half the Battle for EdTech

TechCrunch recently reported on accusations levied by the Federal Trade Commission against edtech giant Chegg – the FTC filed a legal complaint earlier this week indicating that Chegg’s lapses in cybersecurity compliance has resulted in numerous separate data breaches in recent years, and that these breaches were avoidable with better cybersecurity practices.

Sai Huda, CEO of CyberCatch, explains that cybersecurity compliance is only the first step in ensuring data security for edtech customers. The knack is ongoing maintenance and management of those security systems to identify and plug holes as needed – with thousands of attacks levied against educational institutions, hackers will always find vulnerabilities and exploit them.

Sai’s Thoughts

“Along with that, there’s gotta be two other things they’ve gotta do. One is they’ve gotta test those controls regularly. So just implementing the hundred eight controls and thinking you’re in compliance, it is just step one, the step 2, 3, 4, 5, 6, 7, 8, 9, 10 are to continuously test those controls because controls will break.

So, the key is to find those control failures, those security holes before the attackers do, and then plug them, and therefore the attackers will not be able to exploit those security holes and will not be able to be successful. The third thing the school sector must do is to have an incident response plan because it’s not a question of if, but when an incident will happen.

So the key is to be able to detect this incident and then to be able to respond so that damage is mitigated so that perhaps ransomware isn’t spread. Perhaps it can be curtailed. Data can be prevented from being stolen. Incident response plan is also key, and it must be implemented. That’s the way to be successful.

K12 schools are definitely in line of sight of attackers. CyberCatch scanned over 11,000 websites, internet facing assets of K-12 schools in the US and we found over 60% having vulnerabilities attackers can easily exploit break in, install ransomware and steal data.

So, this along with the FTCs order, should be a wakeup call for the whole K-12 sector to be proactive.”

Follow us on social media for the latest updates in B2B!

Image

Latest

IC-SAT100
Meet IC-SAT100, a Satellite PTT Radio Built for the World’s Most Demanding Environments
February 5, 2026

Meet the IC-SAT100, a satellite Push-To-Talk radio designed for moments when ordinary communication just isn’t an option. Powered by the Iridium satellite network, this rugged handheld delivers instant one-to-many communication at the push of a button—no cell towers or ground infrastructure required. Built to thrive in harsh environments, it’s waterproof, dust-tight, and engineered for…

Read More
IP110H
From Hospitals to Warehouses, the IP110H Keeps Your Team in Sync
February 5, 2026

Icom’s IP110H is a compact, license-free WLAN radio built to keep teams talking—clearly and instantly—over an existing wireless network. Designed for environments like hospitals, hotels, warehouses, and tunnels, it delivers real-time, full-duplex voice using Icom’s advanced IP radio system. From Bluetooth capability to USB-C charging and a sleek, pocket-friendly design, the IP110H feels modern,…

Read More
IP501H
The IP501H Brings Effortless, Wide-Area Communication to Your Team
February 4, 2026

Meet the IP501H, a cellular two-way radio built for instant wide-area communication over LTE (4G) and 3G networks. It works just like a traditional radio—supporting individual, group, and all-call conversations—without the need for repeaters or a dedicated IP network. With everything included in the box, the IP501H is designed for quick setup and fast…

Read More
IP730D
One Radio, Three Networks, Seamless Coverage: Meet the IP730D
February 4, 2026

The IP730D is a true game-changer in professional communications, blending LTE, IDAS, and analog networks into one powerful hybrid radio. Designed for flexibility and confidence in the field, it uses dual PTT buttons to let users transmit and receive across networks seamlessly—delivering reliable, wide-area coverage wherever it’s needed. From the moment it comes out of…

Read More