InfoSec / Cyber

Department for Education's Cyber Security Hub graphic, showing digital protection for schools against cyber threats.

What School Leaders Need to Know About the DfE's New Cyber Security Hub

Cyber attacks on schools are no longer a distant threat. The Department for Education (DfE) has just launched a dedicated Cyber Security Hub to help schools navigate this growing danger, and as a school leader, it's worth understanding exactly what it offers and why it matters.  If you were at our conference in February you were lucky enough to see a preview of the tool!

Read more …

Know your IT Support Provider graphic. IT Support Due Diligence Directory for schools and colleges.

Is your IT Support Provider Compliant?

Finding the right IT partner and support provider is a big decision.  Due diligence for IT Support isn't just about who can 'fix computers', it's about ensuring standards are followed and they work with you to meet your organisation's strategy. Data Protection Education has a DfE IT Support Tracker and Supplier Due Diligence Directory to provide support and guidance as well as tracking your progress.

Read more …

The Government Cyber Action Plan 2026 document. UK public sector cyber security strategy.

The Government Cyber Action Plan

The Government Cyber Action Plan, published in January 2026, sets out a radical shift in how the UK public sector manages cyber security and digital resilience. It moves away from fragmented, siloed defences toward a "Defend as One" model led by a new Government Cyber Unit within the Department for Science, Innovation and Technology (DSIT).

Read more …

  1. IT Support Standards for Schools and Colleges Guidance (DfE Digital Standards)
  2. October 31. On the road to improving cyber resilience
  3. October 30. Cyber Support
  4. October 29. Admin Controls & Accounts
  5. October 28. Phishing: Don't Take the Bait!
  6. October 27. Passwords
  7. October 26. Physical Security of Digital Assets
  8. October 25. Server Security: Protecting Your Digital Core
  9. October 24. Backups: Your Recovery Safety Net
  10. October 23. Filtering and Monitoring
  11. October 22. Hardware: Printers
  12. October 21. Hardware: Asset Management
  13. October 20. Hardware: Safe disposal
  14. October 19. Anti-virus/anti-malware
  15. October 18. Regular Updates: Patching Against Threats
  16. October 17. Access Control: Managing User Privileges
  17. October 16. Access Control: Securing Your Digital Gateways (Wi-Fi & Networks)
  18. October 15. Access Control: Securing Your Home Office (Working From Home)
  19. October 14. Access Control : (Multi-factor authentication)
  20. October 13. Cyber Security Awareness
  21. October 12. Training: Empowering your human firewall
  22. October 11. Policies and Procedures: Cyber Blueprint
  23. October 10. Understanding Your Cyber Posture
  24. Time's Ticking: Windows 10 support ends in October 2025!
  25. October 9. A Guide for Education Providers
  26. October 8. How Can Your Organisation Prevent Ransomware Attacks?
  27. October 7: Under Attack: The Reality of Ransomware
  28. October 6: Cyber Action Plan and A Roadmap to Resilience
  29. October 5: Cyber Responsibilities - We're All in This Together
  30. October 4: When a Cyber Attack Hits
  31. October 3: Data Security, the Core of Protection
  32. October 2: Privacy Protection & Safeguarding Personal Data
  33. October 1: Welcome to Cyber Security Awareness Month!
  34. Nursery Cyber attack
  35. The NCSC Cyber Assessment Framework
  36. The Classroom's Dark Side: Cyber crime from the Classroom
  37. The Latest Cyber Threat: The "Murky Panda"
  38. Social engineering + impersonation = Fraud ≡ cyber deception
  39. School cyber attack: Framlingham College, Suffolk
  40. Getting caught in the Scattered Spider web
  41. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  42. Apple removes its highest level data security tool from UK customers
  43. The role of Passkeys in Cyber Resilience and Cyber Security
  44. Effectively communicating during a cyber incident
  45. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  46. How does the recent global IT outage affect me?
  47. King's speech introduces new bills in relation to cyber security, smart data and digital information
  48. What's a Cyber Incident and what should we do?
  49. Free short cyber training for staff
  50. Children's mental health data leaked after a cyber attack
  51. Cyber Incident Review: The Benefits
  52. Cyber attack on a University
  53. Kent Councils Data Breach
  54. Phishing attacks targeting schools - alert from City of London Police
  55. Update on Advisory for Rhysida Ransomware
  56. The Crime in a Cyber Attack and a Data Breach
  57. NCSC Annual Review is published for 2023
  58. Learning from Data Breaches
  59. Windows 11 security ineffective against attacks on old devices
  60. International Counter Ransomware Initiative 2023 Joint Statement
  61. Top Ten Cyber Security Misconfigurations
  62. ICO Reprimand: company suffered a ransomware attack
  63. The UK Online Safety Bill becomes an Act (Law)
  64. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  65. Ransomware, extortion and the cyber crime ecosystem
  66. Cyber Resource: The Cyber Resilience Centre Group
  67. Email and Security: ICO recent guidance
  68. What to do in the event of a Cyber Attack
  69. Cyber Crime: AI Generated Phishing Attacks
  70. Cyber Attack: Exam Boards
  71. VICE SOCIETY - Ransomware attacks on schools
  72. Be Cyber Aware: USB Sticks
  73. Cyber Insurance in the Public Sector
  74. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  75. Cyber Attack: Leytonstone School
  76. Be Cyber Aware: Firewalls
  77. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  78. Cyber Attack: Dorchester School
  79. Types of Cyber Attacks: Password Attacks
  80. Be Cyber Aware: Why regular software updates are important
  81. Cyber Attack: Wiltshire School
  82. Keeping your IT systems safe and secure
  83. Why we recommend using PIN codes on printers
  84. Types of Cyber Attacks: DDoS Attacks
  85. Types of Cyber Attacks: Phishing
  86. Types of Cyber Attacks: The Insider Threat
  87. Why your data is profitable to cyber criminals
  88. Types of malware and how they are linked to data protection
  89. How a school fought back after a cyberattack
  90. Types of Cyber Attacks - Credential Stuffing
  91. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  92. The Education sector now at highest risk of cyber attacks
  93. Cyber Attacks
  94. Emails – good practice and minimising the risk of a data breach

Search