All News

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 7: Under Attack: The Reality of Ransomware

The headlines often focus on large organisations or governments falling victim to cyber attacks, such as M&S and the Co-op, however, there is an increasing number of attacks on schools and colleges.  A ransomware attack on a school can be particularly devastating, crippling operations, disrupting learning and putting sensitive student and staff data at risk.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 4: When a Cyber Attack Hits

Even with the robust preventative measures, cyber attacks can happen.  The key is is not to panic and to have a plan, most organisations will call this a cyber incident response plan.  Knowing what to do in the immediate aftermath can significantly mitigate the damage, limit data loss and speed up recovery.

Read more …

  1. New e-learning for 2025
  2. The Latest Cyber Threat: The "Murky Panda"
  3. Building a Secure School: Using the ICO Accountability Framework to Meet DfE Digital Standards
  4. Digital Safeguarding: DfE announces statutory DfE Digital Standards
  5. Compliance Reporting from the Knowledge Bank
  6. Social engineering + impersonation = Fraud ≡ cyber deception
  7. Data Breaches 2025 Report Highlights
  8. School cyber attack: Framlingham College, Suffolk
  9. Getting caught in the Scattered Spider web
  10. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  11. World Password Day
  12. Social Media and Marketing Guidelines and Training
  13. New Governor Resources
  14. Apple removes its highest level data security tool from UK customers
  15. Safer Internet Day, Cyber Security & Data Protection
  16. The Cyber Resilience Championship
  17. The Multiple Dimensions of Supplier Due Diligence
  18. Blacon High School Cyber Attack
  19. The role of Passkeys in Cyber Resilience and Cyber Security
  20. What the proposed Government legislative proposal around cyber crime means
  21. Effectively communicating during a cyber incident
  22. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  23. Cyber Security Best Practice Area
  24. DfE Digital Standards for Schools and Colleges Tracker
  25. New Policies, Documents, Letters and Posters page
  26. Schools and Trusts Best Practice Area
  27. The DPE Retention Schedule
  28. Making the Rounds Update (now includes reporting)
  29. How does the recent global IT outage affect me?
  30. King's speech introduces new bills in relation to cyber security, smart data and digital information
  31. Out of date technology
  32. What's a Cyber Incident and what should we do?
  33. Cyber attack on a school during half term
  34. Free short cyber training for staff
  35. The rise of cyber attacks in schools are causing pupils to miss classes
  36. ICO: Learning from the mistakes of others report
  37. Children's mental health data leaked after a cyber attack
  38. Cyber attack on a Trust; the aftermath
  39. Social Media Best Practice Area
  40. Lettings Best Practice Area
  41. MFA Bombing - What is it?
  42. Product Focus on Checklists : Initial Trust Plan
  43. Product Focus on Checklists : Information and Cyber Security
  44. Product Focus on Checklists : End of Term Checklist
  45. Product Focus on Checklists : Social Media
  46. Cyber Incident Review: The Benefits
  47. Product Focus on Checklists : Lettings
  48. Product Focus on Checklists : Record of Processing
  49. Why Data Should Stay Put: Benefits of Keeping Data in Its Original System
  50. Product Focus on Checklists : Data Retention and Destruction
  51. Product Focus on Checklists : Data Migration
  52. Product Focus on Checklists : Biometrics
  53. Product Focus on Checklists : Supplier Due Diligence
  54. Free Cyber help, advice and training with the Cyber Resilience Centres
  55. The Perils of Paper: The Printing Vulnerability
  56. Product Focus on Checklists : FOI
  57. Product Focus on Checklists : Governors and Data
  58. Product Focus on Checklists : DPIA
  59. Product Focus on Checklists : Site Moves
  60. Product Focus on Checklists : Data Breaches
  61. Product Focus on Checklists : Subject Access Requests
  62. Cyber attack on a University
  63. Product Focus on Checklists : Bring your own device
  64. Product Focus on Checklists : Working out of school/offsite
  65. Cyber Attack on a School
  66. Product Focus on Checklists : Redaction
  67. Product Focus on Checklists : CCTV
  68. Product Focus on Checklists : Clear desk
  69. Product Focus on Checklists : Commitment to compliance
  70. Product Focus on Checklists : Photos and video
  71. Product Focus on Checklists : Passwords
  72. Product Focus on Checklists : Information Classification
  73. Kent Councils Data Breach
  74. Free cyber training for staff
  75. DfE Digital Standards Update
  76. Where is your data stored?
  77. Phishing attacks targeting schools - alert from City of London Police
  78. The ICO reprimands a Multi Academy Trust
  79. CISA and UK NCSC Announce Joint Guidelines for Secure AI System Development
  80. Trust Initial Plan Checklist Update
  81. Update on Advisory for Rhysida Ransomware
  82. Records Management Best Practice Update
  83. The Crime in a Cyber Attack and a Data Breach
  84. NCSC Annual Review is published for 2023
  85. Learning from Data Breaches
  86. Windows 11 security ineffective against attacks on old devices
  87. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  88. International Counter Ransomware Initiative 2023 Joint Statement
  89. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  90. Top Ten Cyber Security Misconfigurations
  91. ICO Reprimand: company suffered a ransomware attack
  92. The UK Online Safety Bill becomes an Act (Law)
  93. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  94. Ransomware, extortion and the cyber crime ecosystem
  95. Cyber Resource: The Cyber Resilience Centre Group
  96. Email and Security: ICO recent guidance
  97. Help after a Cyber Attack/Incident
  98. What to do in the event of a Cyber Attack
  99. How KCSIE is linked to Cyber Strategy
  100. Cyber Crime: AI Generated Phishing Attacks
  101. Cyber Attack: Exam Boards
  102. VICE SOCIETY - Ransomware attacks on schools
  103. Using Tags if you are a group of organisations in the DPE Knowledge Bank
  104. Where's Harry the Hacker?
  105. Be Cyber Aware: USB Sticks
  106. Cyber Insurance in the Public Sector
  107. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  108. Cyber Attack: Leytonstone School
  109. Be Cyber Aware: Firewalls
  110. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  111. Cyber Attack: Dorchester School
  112. Knowledge Bank Role Types: Admin, Staff and Trustee
  113. Types of Cyber Attacks: Password Attacks
  114. Be Cyber Aware: Why regular software updates are important
  115. Cyber Attack: Wiltshire School
  116. Keeping your IT systems safe and secure
  117. Why we recommend using PIN codes on printers
  118. Types of Cyber Attacks: DDoS Attacks
  119. Types of Cyber Attacks: Phishing
  120. Redaction Guidelines Updated
  121. Types of Cyber Attacks: The Insider Threat
  122. Why your data is profitable to cyber criminals
  123. Using WhatsApp in Schools
  124. Knowledge Bank Updates
  125. Types of malware and how they are linked to data protection
  126. A guide to multi-factor authentication
  127. Windows Server 2012 & 2012 R2 Retirement
  128. How to contact us for support, subject access requests, data breaches and FOI's
  129. How a school fought back after a cyberattack
  130. Types of Cyber Attacks - Credential Stuffing
  131. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  132. Assigning courses to staff using to-dos
  133. The Education sector now at highest risk of cyber attacks
  134. Cyber Attacks
  135. Best Practice for Managing Photos and Video
  136. Compliance Manager released
  137. Emails – good practice and minimising the risk of a data breach

Search