
October 4: When a Cyber Attack Hits
Even with the robust preventative measures, cyber attacks can happen. The key is is not to panic and to have a plan, most organisations will call this a cyber incident response plan. Knowing what to do in the immediate aftermath can significantly mitigate the damage, limit data loss and speed up recovery.
Cyber Incident Response Plan
Ideally an organisation should have a cyber incident response plan that is available when all systems are offline, but kept in a secure place as it is likely to include personal contact details of key stakeholders in the organisation. A cyber incident response plan is a list of instructions on what you will do, according to your responsibilities, when a cyber attack happens.
Immediate Steps to take in a Cyber Attack:
-
Disconnect (if applicable): If you suspect a device is infected with malware or being actively attacked, immediately disconnect it from the internet and any networks (unplug the Ethernet cable, turn off Wi-Fi). This can prevent the attack from spreading to other devices or systems. Contact your IT department for further advice.
-
Identify and Isolate: Try to determine what happened. Was it a suspicious email? A clicked link? Which accounts or systems are affected? Isolate those systems if possible. This will usually be done by your IT department or the person dealing with the cyber incident.
-
Change Passwords (Strategically): If you suspect account compromise, immediately change passwords for all affected accounts, starting with your most critical ones (primary email, banking). Use strong, unique passwords, and enable MFA where not already in use. If your email was compromised, use a different device to change the password. You may need IT support to help you with this if you have been locked out of your account. If your account has been compromised, IT may need to check/scan it first to ensure it is 'clean', before you can use it again.
-
Notify Relevant Parties:
-
Individuals: Contact your bank, credit card company, or any service provider whose account you believe was compromised.
-
Organisations: Immediately inform your IT department or cybersecurity team, management, and potentially legal counsel. Depending on the nature of the breach (e.g., personal data), you may have legal obligations to report it to regulators and affected individuals. Details of who to contact and how will be in the Cyber Incident Response Plan.
-
-
Document Everything: Keep a detailed record of what happened, when it happened, what actions you took, and any communications with others. This documentation is crucial for investigation, recovery, and potential legal or insurance claims.
-
Do NOT Pay Ransoms: If you are hit by ransomware, cybersecurity experts and law enforcement universally advise against paying the ransom. There is no guarantee you will get your data back, and paying encourages further attacks. Focus on recovery from backups. If you are a school/multi academy trust, then government guidance says you cannot pay a ransom.
-
Seek Expert Help: If you're overwhelmed or unsure, don't hesitate to contact cybersecurity professionals or law enforcement (e.g., Action Fraud in the UK). They have the expertise to investigate, contain, and recover from sophisticated attacks. Organisations should have documented who to contact as part of their Cyber Incident Response plan, but the police and Action Fraud can help and advise.
Preparation is key. Having a well-rehearsed incident response plan minimises chaos and maximises your chances of a successful recovery.
💡Today's Cyber Tip: Create a "Cyber Emergency Contact" List!
Today, make a list of key contacts you'd call in a cyber emergency: your bank's fraud department, credit card company, IT support (for work), and if needed, local police non-emergency or national cybercrime reporting agencies like Action Fraud (UK). Keep it somewhere safe and easily accessible.
If you work as part of an organisation - ensure you know where the cyber incident response plan is and who has what role. Do you know who to contact in your organisation?
The Cyber Resilience Centres offer free cyber incident response plans: Cyber Resilience Centre Groups.
Further Guidance and Support
Review our free 'Incident Response Planning Video":
The NCSC has updated guidance for different types of businesses for respond and recover. Their guidance splits out the different types of attacks and how they should be responded to.
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
m. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to
DPE Knowledge Bank Guidance and Support:
For schools and colleges, six of the DfE Digital Standards are now mandatory. We have a DfE Digital Standards Tracker tool help you track your cyber resilience and your progress:

Review our Cyber Security Best Practice Area for micro learning, support, guidance and policies:
Why not have a look at our 'specialist' trainer Harry the Hacker :
