<img src="https://secure.7-companycompany.com/795789.png" style="display:none;">

Criminals Targeting School Data - How To Protect Yourself

Friday, 30 May 2025 by Weduc

The results from the UK government’s Cyber security breaches survey 2024: education institutions annex has highlighted a vital need for schools to review their data security measures. The survey identified that 52% of primary and 71% of secondary schools identified a data breach in the last year. 

A graph of a number of school classes

AI-generated content may be incorrect., Picture

Recommended Guidance & Top Tips 

To ensure that you are being pro-active in possible data breaches at your establishment, we suggest that you follow the below guidance and ensure all staff members are educated on the importance of following these steps to prevent possible attacks on your school. 

1. Enhance Staff and Student Awareness

  • Regular Training: Provide ongoing cybersecurity training for staff and age-appropriate lessons for students. Check out the UK’s National Cyber Security Centre (NCSC) for information on Cyber Security Training for School Staff, where staff can gain a certificate upon competition. 
  • Passwords: Prompt all staff to change their passwords regularly and always use strong passwords. Ensure staff never share passwords and do not use the same username and passwords to log in to multiple systems. 
  • Phishing Simulations: Run simulated phishing campaigns to train staff on how to spot suspicious emails. 
  • Exit-Staff Process: Ensure you have a process for when staff leave your school, removing all access from relevant software and ensure their security details are not saved in an accessible place. 
2. Implement Strong Access Controls
  • Two-Factor Authentication (2FA): Require 2FA for staff accessing sensitive systems or data. Coming soon to ReachMoreParents, information to follow in due course. 
  • Role-Based Access: Limit access to data and systems based on staff roles (e.g., admin vs. teaching staff). Restrict who has the permissions to create and remove accounts and ensure staff are not sharing accounts. 
3. Keep Systems and Software Updated
  • Patch Management: Ensure all operating systems, applications, and devices are updated promptly. 
  • Automatic Updates: Enable automatic updates where possible, especially for antivirus and firewall systems. 
4. Strengthen Network Security
  • Firewalls and Antivirus: Use enterprise-level firewalls and regularly updated antivirus software. Ensure antivirus and anti-malware software is installed on all devices, including servers, staff laptops, and student-access terminals. Keep definitions updated automatically and regularly scan for threats. 
  • Segregated Networks: Separate guest/student Wi-Fi from the main school network. This helps contain threats—if a student device is compromised, it won’t affect systems that manage payroll, attendance, or safeguarding information. Use VLANs (Virtual Local Area Networks) to manage this effectively. 
5. Regular Risk Assessments
  • Cyber Audits: Conduct regular audits to identify vulnerabilities. This includes reviewing user access rights, checking for unpatched systems, identifying outdated hardware or software, and ensuring security controls are working as intended. Use tools provided by the NCSC or a trusted IT partner. 
  • Penetration Testing: Employ external experts to test your systems for weaknesses. This simulates real-world attacks and exposes vulnerabilities that might not be caught in routine audits. Ensure findings are documented and addressed promptly. 
6. Backup and Disaster Recovery Planning
  • Regular Backups: Automatically back up important data and store it securely ideally a secure offsite server and a cloud-based system that uses encryption. 
  • Incident Response Plan: Have a clear and tested plan for how to respond to different types of attacks. Ensure the plan includes roles and responsibilities, internal and external communication protocols, and contact details for relevant authorities such as the NCSC and local authority. Practice response drills to build staff confidence in handling emergencies.
7. Engage with National Cybersecurity Resources

Take control of your reputation today