Back to Blog

Harvard Got Breached by a Phone Call — Is Your Team Ready for That?

Daniel ChangFounder of SafeGuardGRC

In February 2026, ShinyHunters — one of the most active cybercriminal groups in the world — published over a million records stolen from Harvard University. The leaked data included alumni email addresses, home addresses, phone numbers, donation histories, and biographical details tied to some of the most prominent names in business, politics, and philanthropy. Specific donation amounts were exposed, including a signed $5 million agreement from billionaire Bill Ackman's foundation.

Harvard didn't get breached because of a software flaw. They didn't get breached because their firewall was misconfigured or because someone left a database password set to "Harvard1234."

They got breached because someone answered the phone.

How a Phone Call Took Down an Ivy League Institution

The attackers used a technique called "vishing" — voice phishing. Instead of sending a suspicious email, they called an administrative staff member in Harvard's Alumni Affairs and Development department. The caller likely impersonated IT support, directed the employee to what appeared to be Harvard's login page (but was actually a fake), and convinced them to enter their credentials and approve a multi-factor authentication prompt.

That was it. One phone call. One moment of trust. And the attackers had full access to one of the most sensitive donor databases in American higher education.

No zero-day exploit. No multi-million-dollar hacking toolkit. Just a well-rehearsed conversation with someone who was trying to be helpful.

This Isn't a "Harvard Problem" — It's a People Problem

It's easy to read this and think: "That would never happen at my firm." But consider this — your team answers calls from unfamiliar numbers every day. During tax season especially, your front desk, your admin staff, and even your partners are fielding inquiries from people they've never met. Someone claims to be from your software vendor, your bank, or even the IRS. They sound professional. They create urgency. And they ask for something that seems reasonable.

The difference between a firm that falls for this and one that doesn't isn't better technology. It's whether your people have been trained to pause, verify, and question — and whether your firm has created an environment where doing so is expected, not awkward.

Harvard has a dedicated IT security team, enterprise-grade identity management, and multi-factor authentication across its systems. None of that stopped a single phone call from compromising everything. The technology worked exactly as designed — an authorized user authenticated with valid credentials. The failure was that the authorized user had been manipulated into doing so.

Why Your IT Provider Can't Solve This Alone

Your MSP or IT team does critical work. They set up your firewalls, manage your email filters, deploy MFA, and keep your systems patched. That work matters — it keeps out the vast majority of automated attacks.

But here's the thing: voice phishing doesn't trip a firewall. A convincing caller doesn't get flagged by your spam filter. When an employee willingly enters their real password on a fake page and approves the MFA prompt on their phone, every technical control sees that as a legitimate login.

This is where the conversation shifts from technology to leadership.

Your IT provider protects your systems. But who prepares your people? Who decides what verification steps an employee should follow before sharing credentials over the phone? Who makes sure new hires learn those steps during their first week? Who runs a practice drill so your team knows what a phishing call actually sounds like?

That's not IT. That's you — the firm owner. That's governance.

Training Isn't a Checkbox — It's a Culture

Most firms that do security awareness training treat it as an annual requirement. Employees sit through a 30-minute video, click "complete," and go back to work. By the time tax season rolls around, they've forgotten most of it.

Harvard's staff almost certainly completed security training. They had MFA. They had policies. What they apparently didn't have was a culture where an administrative assistant felt empowered — or was specifically trained — to say: "I need to verify this request through a different channel before I proceed."

Building that culture is a leadership responsibility. It means:

  • Making verification normal. When someone calls claiming to be from your software vendor and asks for login help, your team should know to hang up and call the vendor directly using a known number. That shouldn't feel rude — it should feel routine.

  • Running realistic drills. Not just email phishing simulations, but occasional phone-based tests. How does your office manager respond when someone calls pretending to be a new client who needs "just a quick look" at their file? What happens when someone impersonates your bank and asks for account verification?

  • Removing blame from the equation. If an employee reports that they might have fallen for a suspicious call, the response should be "thank you for telling us immediately" — not "how could you let that happen?" Firms that punish mistakes create employees who hide them. Firms that reward reporting create teams that catch threats early.

  • Documenting expectations. The FTC Safeguards Rule doesn't just require technical safeguards. It requires that you have a written program that includes employee training and that you can demonstrate your team knows the procedures. If your training program is "we told everyone to be careful," that won't hold up.

What You Can Do Today

You don't need to hire a CISO or overhaul your phone system. But you do need to close the gap between your technical controls and your team's readiness.

  1. Establish a verification policy. Write down a simple rule: no one at the firm provides credentials, client data, or system access based solely on an inbound phone call or email. Every sensitive request gets verified through a separate, known channel. Put it in writing and make sure every employee has read it.

  2. Brief your team on vishing. Most employees know what a phishing email looks like. Far fewer know that the same tactic works over the phone — often more effectively, because a live voice creates urgency and social pressure. A 15-minute team huddle explaining the Harvard breach and what to watch for can change behavior immediately.

  3. Test it. Have someone (even yourself) call the office pretending to be from your tax software provider and ask for a password reset or login assistance. See what happens. You'll learn more from a five-minute test than from any training video.

  4. Include it in onboarding. Every new hire should learn your verification procedures before they answer their first phone call. If someone joins during tax season — when the pressure is highest — they're especially vulnerable if they don't know the rules.

  5. Document the training. Keep a record of what you covered, when, and who attended. The FTC and state regulators expect to see evidence that your team has been trained — not just that a policy exists on paper.

The Bottom Line

Harvard's breach is a reminder that the most expensive security infrastructure in the world can be undone by a single conversation. The attackers didn't hack a server — they hacked a person. And they did it with nothing more than a phone and a convincing story.

For CPA firm owners, the lesson isn't to buy more software. It's to invest in your team's ability to recognize, question, and report suspicious interactions. That's not an IT project — it's a leadership decision. And it's one of the most cost-effective security investments you can make.

If you're wondering whether your firm's training, policies, and documentation meet what the FTC expects, SafeGuardGRC can help you build a governance program that covers not just the technical side, but the human side too — with training frameworks, policy templates tailored to your firm, and the documentation you need to prove it's all in place.

The next breach won't start with code. It'll start with a conversation. Make sure your team is ready for it.

Ready to Get Compliant?

Plans starting at $99/mo for firms of every size

See Plans & Pricing

Starting at $99/mo · Billed annually

30-day money-back guarantee
Cancel anytime

Core compliance modules in every plan · Professional adds IRP, tasks & more →

We use cookies to measure site performance and improve your experience. No data is sold to third parties. Privacy Policy