San Diego Community College District
Student portal, internet systems, and district websites went offline on May 2. Login credentials and personal student information compromised.
What happened?
On May 2, 2026, the San Diego Community College District took its student portal, internet systems, and district websites offline following a security incident. The district serves over 80,000 students across City, Mesa, and Miramar colleges. Students attempting to access the portal for course registration, grades, and financial aid were met with outage messages.
What data was actually inside?
Student portal login credentials and personal student information. The portal grants access to enrollment records, academic transcripts, financial aid applications, student account balances, and communication between students and faculty. Every student interaction with the district's administrative systems flows through this infrastructure.
For community college students, the portal isn't optional. It's how they register for classes, apply for financial aid, view grades, and manage payment plans. The compromise affected the authentication layer that gates access to all of it.
Who gets hurt and how?
Community college students often juggle work, family obligations, and education. Many rely on financial aid. Many are first-generation college students. The timing matters—May is when students register for summer and fall courses, finalize financial aid, and make enrollment decisions.
Compromised login credentials enable account takeover. Attackers with access to student portals can modify enrollment, redirect financial aid refunds, access tax information from 1098-T forms, or harvest data for identity theft. For students already operating on thin margins, a redirected financial aid payment or fraudulent enrollment change has immediate consequences.
What did they think they were doing right?
The district took systems offline immediately upon detection—exactly what incident response protocols dictate. Contain the threat, prevent further compromise, assess the damage. They chose operational disruption over continued exposure.
Educational institutions operate student information systems that have evolved over decades. These systems connect student portals to enrollment databases, financial aid systems, learning management platforms, and payment processors. The district likely believed their authentication controls and network segmentation protected student data. The compromise proved otherwise.
What did they not know about their own data?
Student information systems accumulate data across semesters and years. Enrollment records going back decades. Financial transactions. Academic transcripts. Correspondence. The portal provides a window into all of it, but organizations often don't inventory exactly what student data exists where, how long it's retained, or which systems can access it.
The district disclosed that "personal student information" was affected, but the full scope remains unclear. Did the compromise extend beyond credentials to the underlying databases? Which years of student records were accessible? What personally identifiable information was actually stored in systems the portal could reach? These questions reveal the inventory gap.
If your environment was compromised today, could you say within 24 hours exactly what sensitive data was accessed?
What does attribution look like the morning after?
The district faces notification obligations under California's education data privacy laws and potentially FERPA requirements. Every student whose portal credentials were compromised needs notification. Every student whose personal information was accessed needs notification. The timeline starts from when the district knew or should have known about the breach.
For students, the immediate impact is locked systems during a critical enrollment period. The longer-term impact depends on what attackers did with the access while they had it. Credential stuffing attacks using harvested student logins often don't surface until months later when fraudulent financial aid applications or account takeovers start appearing.
What would have changed the outcome?
Knowing exactly what student data the portal authentication layer could access before attackers compromised those credentials.
Student information systems aren't single databases. They're interconnected platforms—enrollment systems talking to financial aid databases, portals querying academic records, payment processors accessing student accounts. An organization that had mapped these data flows would know immediately what's at risk when portal credentials are compromised.
Instead, the district is working backward from a breach to understand its own systems. That's the inventory problem. You can't protect data you haven't mapped, and you can't assess breach impact when you're discovering your data architecture from forensics reports.
San Diego Community College District found out the hard way.
Your team could spend the next 6 months rebuilding systems, notifying customers, and answering legal questions. Or you could spend 24 hours finding out what's actually at risk.