Education sits at a genuinely difficult intersection. Institutions are expected to be open — to students, staff, researchers, community partners, international collaborators and an ever-growing fleet of personal devices — while simultaneously protecting some of the most sensitive data in the country: student records, medical information, research intellectual property, financial details and the personal information of minors.
That tension does not resolve itself. It has to be engineered around.
The ASD’s Annual Cyber Threat Report 2023–24 identified education and training as the second most-reported critical infrastructure sector for cyber incidents in Australia, accounting for 17% of all critical infrastructure reports. In the same period, the Office of the Australian Information Commissioner recorded 44 notifiable data breaches from Australian education institutions in the first six months of 2024 alone — placing the sector consistently among the top five most-breached industries nationally. These figures represent the most recent period for which ASD has published granular sector-level data; the trend from all available indicators points in one direction.
The incidents are not hypothetical. Western Sydney University reported three separate security breaches through 2024, including a compromise of its Microsoft Office 365 environment and a breach through a single sign-on system that exposed student demographic, enrolment and progression data — with one breach going undetected for approximately 16 days. The University of Notre Dame Australia reported a cyber incident affecting its multi-factor authentication service in early 2025. The Queensland University of Technology experienced a ransomware attack that exposed HR files, email communications and staff ID cards. The Association of Independent Schools NSW discovered Gootloader malware on their systems following a notification from ASD — a reminder that smaller institutions are equally exposed, and that attackers do not discriminate by size or sector type.
What attackers are after: Student personally identifiable information commands consistent value on dark web markets. Research intellectual property — particularly in biotechnology, defence and AI — attracts state-sponsored actors. Credentials stolen from education environments are routinely used to pivot into broader attacks. And for ransomware groups, education institutions represent an attractive target precisely because downtime is operationally catastrophic: cancelled classes, disrupted exams, frozen research systems and immediate reputational damage all follow a successful attack.
The device problem: The average Australian university campus now supports tens of thousands of connected devices simultaneously — student laptops, tablets, smartphones, research equipment, building management systems, access control, CCTV, IoT sensors and legacy infrastructure. Every device is a potential entry point. Add the expectations of modern learning environments — high-bandwidth video, cloud-based collaboration platforms, and increasingly VR and AR applications — and the network infrastructure demand alone is substantial. Segmentation, identity management and continuous visibility are not optional architecture choices; they are operational requirements.
The resourcing reality: Unlike finance or healthcare, most education institutions operate IT and security functions with teams that are significantly under-resourced relative to the attack surface they are defending. Budget constraints, competition for skilled security personnel, and the governance complexity of managing shared services across faculties and campuses all compound the challenge. The result is that many institutions are reactive by necessity rather than by choice.