Awareness Day Twenty Eight: Phishing
"Wherever there is technology there needs to be cybersecurity"
Implementing cybersecurity best practices is important for organisations of all sizes to protect personal, financial and sensitive information.
Awareness Day Twenty Eight Phishing
91% of all cyber attacks begin with a phishing email to an unexpected victim :Deloitte News Article.
Recognise and Report Phishing (Recognising Red Flags 🚩):
- A tone that's urgent or makes you feel scared (i.e. click immediately or your account will be closed)
- The sender email doesn't match the company it's coming from (unusual spellings)
- An email you weren't expecting
- Request to send personal information
- Misspelled words, bad grammar and unusual URLs can still be a sign of phishing

Information source: CISA Cyber Security Awareness Month
General guidance for preventing a phishing attack:
- Install security software on mobile devices.
- Avoid browsing certain websites, block if necessary.
- Only download reputable mobile applications from legitimate sources and restrict within an organisation. Consider having an 'approved' software list for the organisation.
- Exercise caution on social media.
- Use different passwords - see previous article on Passwords: October is Cyber Security Awareness Month: 27. Passwords
- .
- Beware of phishing emails - Article: Types of Cyber Attacks: Phishing.
- Be careful when using public wireless networks.
- Consciously keep up with current security trends and threats.
Review: DfE Cyber Security Standards for Schools and Colleges.
Take a look at our Drip Feed poster:
pdf Who's sending you emails (151 KB)
Review NCSC Phishing Guidance:
Phishing: Spot and report scam emails, texts, websites and calls
Phishing attacks: defending your organisation
Review DPE's previous articles about phishing:
Types of Cyber Attacks: Phishing
Freebies: Data Protection Education
Are teachers using AI? 83% say its a time-saver
Cyber Crime: AI Generated Phishing Attacks
More questions like these are in our Information and Cyber Security Checklist (only viewable with a valid Data Protection Education subscription):
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
m. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to

Review our Cyber Security Best Practice Area for micro learning, support, guidance and policies:

Why not have a look at our 'specialist' trainer Harry the Hacker :
