- NWFSC News 2013
- NWFSC News 2012
- NWFSC News 2011
- NWFSC News 2010
- NWFSC News 2009
- NWFSC News 2008
- NWFSC News 2007
- NWFSC News 2006
- NWFSC News 2005
- NWFSC News 2004
- NWFSC News 2003
- NWFSC News 2002
- NWFSC News 2001
- Spirit of '45 Day Express to Make Stop
- Dental Assisting Graduates Honored
- Paramedic Graduates Honored
- NWF State College to Host Annual College Night
- Bachelor of Science in Nursing Graduates Honored
- Parent Information Meetings on Dual Enrollment
- Students Named to President's List and Dean's List for Summer 2014
- Integrated Career and Technical Education Initiative Launched
- Huckabee Event to Benefit College's Music Programs
- NWF State College again recognized as Military Friendly School
- NWF State College Saddened by the Loss of Coach Patrick Harrington
- Celebration of Life set for Coach Patrick Harrington
- Tamela McCorvey Named Acting Head Womenâ€™s Basketball Coach
- Tamela McCorvey Named Acting Head Women's Basketball Coach
- Ribando Compositions Performed in Virginia, New York City
- Free IT Pro Camp Scheduled for Nov. 22
- SGA Reflects Student Involvement at 'All-Time High'
(updated) College Reports Breach of Confidential Employee Information
College Reports Breach of Confidential Employee Information via Unknown Outside Source, Investigation On-Going Limited Student Data May Also Be Affected
An internal review by Northwest Florida State College on October 1 – 5, 2012 has indicated a breach in the security of college’s computer systems which has compromised the personal information of some 3,200 current and retired college employees. The investigation is ongoing with both an external expert consultant and a cybercrimes investigator from the Okaloosa County Sheriff’s Office.
At this point in time, the personal information of employees includes name, birthdate, employee Direct Deposit bank routing and account number information, and Social Security number. Approximately 50 employees to date have reported issues with identity theft, including the college president, faculty and staff.
The breach was an unlawful, unauthorized acquisition of computerized data by an entity/person outside the college that materially compromised the confidentiality of personal information maintained by the college. The employee data was breached between May 21 to September 24, 2012.
“The integrity of the NWFSC system has been restored and there is no indication of any additional instances of compromise of personal information,” said Dr. Ty Handy, college president. “An investigation is ongoing on the full nature and scope of the breach. As soon as the issue was identified last week, the college began to alert employees through a series of all-campus e-mails and will provide an additional formal notification, which is required by law to be sent out within 45 days, as more complete information becomes available.”
“As we determine the full scope of the matter, we will be able to issue the more formal notifications,” said Dr. Ty Handy. “We hope, by the end of this week to know precisely which persons have had their information compromised. We will not wait 45 days to provide the individuals affected direct contact regarding this but will do it as soon as we can.”
“We provided information to employees as soon as we had an indication that there was an issue – when we initially had reports from five employees that their direct deposit accounts had been unlawfully accessed,” said Handy. “We needed employees to take immediate steps to individually review and protect their personal data. As they did, more employees began to report issues once they reviewed their information. We brought in the sheriff’s office and have asked each employee affected to a complete an affidavit detailing their issues. I understand the Sherrif’s office is consolidating all the affidavits and is handling this as a single case. Some employees had the bank account where they receive direct deposit of their pay checks accessed and funds removed, a few others have had fraudulent credit card charges or accounts set up in their names.”
Handy elaborated further, “We know that from May 21, 2012 until September 24, 2012 one or more hackers accessed one folder on our main server. This folder had multiple files on it. No one file had a complete set of personal information regarding individuals. However, by working between files, the hacker(s) have been able to piece together enough information to be able to engage in identity theft for at least 50 employees. We know that by working between files, data regarding name, Social Security number, date of birth, and Direct Deposit Account numbers were accessed. Additional directory information such as address, phone numbers, college email address, etc. was also likely compromised.”
“We speculate that this was a professional, coordinated attack by one or more hackers. We believe that the hackers are having to do specific work to pull together enough information about an individual employee to steal their identity. We do not believe that they have accessed this information on all 3,200 individuals in the file, but that the potential does exist,” Handy said.
In terms of student data, Dr. Handy noted, “In addition to the employee data, it appears that some student information including public directory information, as well as birth date and social security number, may have been accessed, but we have no evidence at this point that shows that this information was taken. There is no indication that any student academic files have been compromised.” Handy stressed that the college has had no complaint reports from students to date. “We will formally send student notifications when we have more complete information.”
“We also believe that a few vendors (less than 40) with whom we do electronic funds transfers for bill payments may also have had account information taken but, again, we have no concrete evidence that this information was taken.”
Dr. Handy stressed what is currently known and what is still speculative, based on the on-going nature of the investigation. “We know that three specific mechanisms have been used to engage in identity theft. The first is to use PayDayMax, Inc. as a conduit for taking out a personal loan which is repaid by debiting the employee’s personal bank account. The second is the same process using Discount Advance Loans. The third is to apply for a Home Depot Credit Card in an employee’s name and then use that card. We know that current employees and all retirees/past employees since 2002 who have had direct deposit of their pay have potentially had their information compromised. We know that the total number of potentially impacted employees is about 3,201.”
Dr. Handy noted that the college is working to set up a website which should be up by the end of the week which will include information and updated posting on the issue. The site address will be announced as soon as it becomes available.
UPDATE (October 10, 2012): A website with the latest information about the data security breach is available at http://www.nwfsc.edu/security/.