Cyber security experts say they aren't surprised by the major breach in security at the University of Maryland.
They say as technology gets more sophisticated, so do the attacks.
"My social security number is out there somewhere so I'm definitely worried what's going to happen,"Nykolaus Pinnock, a College Park student, said.
That is the reality for more than 309,000 students, faculty, staff and other people affiliated with the University of Maryland, College Park and Shady Grove campuses, since 1998.
"It really makes you wonder what's going on at the school. They say they're prepared for certain things that happen but you never really know what can happen," Pinnock said.
It is hard to predict a sophisticated computer security attack, but leaders at Maryland thought they were prepared.
In a letter to everyone potentially impacted, President Wallace Loh said the university recently doubled the number of IT security engineers and analysts to the team. But it still was not enough to stop Tuesday's attack.
Chris Ensey, Chief Operating Officer of Dunbar Digital Armor, commends the university for immediately passing along word of the breach.
He says even though the records the hackers got a hold of didn't have financial, health or contact information, they can still do a lot of damage with what they did get.
"You have a very limited credit history for students. They haven't established a credit history so when you go after a target like that and you have thousands if not hundreds of thousands of fresh compromisable [sic] social security numbers, you can do a lot with that. You can open up lines of credit where there aren't, there isn't good data to trigger the fraud systems so that's incredibly valuable," Ensey said.
The university is offering free credit monitoring for a year for anyone impacted.
In the meantime, Ensey says while this won't be the last attack, there is still a silver lining.
"We are meeting the challenge as it gets worse and worse and worse but we have to come up with better ways to address these issues as quickly as possible so that when that network does get breached and these things do occur, the reaction time is shorter," Ensey said.