Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

PowerSchool Attackers Extorting Teachers, Security Leaders Respond

By Jordyn Alger, Managing Editor
Stacked books

Kimberly Farmer via Unsplash

May 12, 2025

The PowerSchool breach continues to have impacts on staff and students, as the hackers have begun individually extorting schools and threatening to expose stolen student and teacher data — unless a ransom is paid. 

The initial breach affected the information of more than 60 million children and 9.5 million teachers. The organization paid a ransom in exchange for the stolen data being deleted; however, this deletion apparently did not occur. 

Below, security leaders share their insights on how organizations should navigate ransom payments. 

Security Leaders Weigh In 

Ms. Ngoc Bui, Cybersecurity Expert at Menlo Security:

While paying ransoms might incentivize threat actors, the reality is that not paying a ransom could be more damaging, especially for organizations involved in critical infrastructure. The disruption from ransomware can be disastrous, and organizations of all sizes must prioritize protecting both operations and stakeholders. Organizations that suffer a ransomware attack should also use it as a learning opportunity to fine-tune their security measures and ensure they are using actionable intelligence to do so.

Gareth Lindahl-Wise, Chief Information Security Officer at Ontinue:

The brutal truth we must face is the recognition from the cybercriminals that if an organization has succumbed to ransomware attack and paid a ransom, they are more likely to pay again to keep a data breach from becoming public. As defenses against ransomware locking devices and data improve, I expect that we may see the predominate revenue stream from the malware reverting to data theft/extortion.

Darren Guccione, CEO and Co-Founder at Keeper Security:

When faced with a ransomware attack, organizations are faced with a difficult decision — whether or not a ransom should be paid. Paying a ransom to release their data may seem like the simplest solution, however, it is often illegal and only fuels the explosive growth of this criminal activity. Also, in this instance and many other cases, paying a ransom doesn’t guarantee the cybercriminal’s illicit activities will end. Cybercriminals often receive payment and subsequently leverage the stolen files to further monetize their value.  

Generally, a payment absent proper responsive cybersecurity protection increases the probability of a future attack, as cybercriminals now know they will pay the ransom. Cybersecurity investment before a cybercriminal strikes is critical for organizations of all sizes. A zero-trust security model with data back-ups will limit exposure if a cyberattack occurs. Additionally, strong authentication and encryption measures on the front end will help prevent a data breach. IT professionals need to consider the security of their third-party vendors, as a vendor breach can have significant downstream effects, which the schools affected by this attack are experiencing firsthand.

Beyond immediate remediation, schools should focus on strengthening access controls, enforcing phishing-resistant multi-factor authentication (MFA) and ensuring all accounts use strong, unique passwords that are stored in an encrypted password manager. Implementing a zero-trust security model with privileged access management, where every login attempt is verified and administrative privileges are tightly controlled, can reduce the risk of future attacks and greatly diminish the impact if a successful attack occurs.

Heath Renfrow, CISO and Co-founder at Fenix24:

This situation with PowerSchool is yet another unfortunate reminder that paying a ransom does not guarantee safety, it only perpetuates a cycle of criminal leverage and broken promises. While I understand the emotional and operational pressure that leads organizations to pay, the PowerSchool case demonstrates why this route is fraught with long-term consequences.

We’ve seen multiple examples where paying the ransom resulted in either:

  • Data being leaked anyway, sometimes months later, as extortion groups double-dip or sell the data despite prior agreements,
  • A return visit from the same threat actor, who now knows the organization is willing to pay,
  • Or the emergence of third-party victimization, where clients, partners, or students — in this case — are individually targeted.

Paying may provide a short-term illusion of control, but it undermines long-term recovery and resilience. The FBI’s advice to avoid paying ransoms exists for good reason, there is no enforceable contract in cybercrime, only hope and high risk.

Instead, the better path is investing in immutable backups, hardening identity infrastructure, and accelerating restoration timelines so organizations don’t have to choose between business survival and ethics. The PowerSchool fallout should drive home the message: trusting cybercriminals is a losing bet.

KEYWORDS: ransom ransomware school cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person in front of monitor

    Security leaders respond to Olympic venue ransomware attack

    See More
  • The Keeper of the Plains statue

    Security leaders respond to ransomware attack on the city of Wichita

    See More
  • Laptop with green text

    Security Leaders Respond to Workday Cyber Incident

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing