Keeping your IT systems safe and secure
The ICO recently published an updated article aimed at small business with tips for IT security - this advice would also be applicable for schools and colleges.
This table shows the advice from the ICO and how areas of the Data Protection Education Knowledge Bank can help and guide you in those areas.
| ICO Recommendation | DPE Knowledge Bank Links |
| Back up your data |
|
| Use strong passwords and multi-factor authentication |
Password Best Practice Library |
| Be aware of your surroundings |
Information & Cyber Security Best Practice Library How to avoid a data breach: Information and Cyber Security Training Course |
| Be way of suspicious emails |
Phishing Simulation |
| Install anti-virus and malware protection | |
| Protect your device when it's unattended | |
| Make sure your Wi-Fi connection is secure | Info/Cyber Security Checklist |
| Limit access to those who need it | |
| Take care when sharing your screen | |
|
Don't keep data for longer than you need it |
Records Management Best Practice Library |
|
Dispose of old IT equipment and records securely |
Info/Cyber Security Checklist |
The full ICO article is here: 11 Practical Ways to Keep Your Systems Safe And Secure
Further ICO Password guidance: Passwords in online services
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to
