All News

Know your IT Support Provider graphic. IT Support Due Diligence Directory for schools and colleges.

Is your IT Support Provider Compliant?

Finding the right IT partner and support provider is a big decision.  Due diligence for IT Support isn't just about who can 'fix computers', it's about ensuring standards are followed and they work with you to meet your organisation's strategy. Data Protection Education has a DfE IT Support Tracker and Supplier Due Diligence Directory to provide support and guidance as well as tracking your progress.

Read more …

The Government Cyber Action Plan 2026 document. UK public sector cyber security strategy.

The Government Cyber Action Plan

The Government Cyber Action Plan, published in January 2026, sets out a radical shift in how the UK public sector manages cyber security and digital resilience. It moves away from fragmented, siloed defences toward a "Defend as One" model led by a new Government Cyber Unit within the Department for Science, Innovation and Technology (DSIT).

Read more …

  1. Four London councils hit by cyber attacks - Hackney, Westminster, Kensington & Chelsea, and Hammersmith & Fulham
  2. IT Support Standards for Schools and Colleges Guidance (DfE Digital Standards)
  3. October 31. On the road to improving cyber resilience
  4. October 30. Cyber Support
  5. October 29. Admin Controls & Accounts
  6. October 28. Phishing: Don't Take the Bait!
  7. October 27. Passwords
  8. October 26. Physical Security of Digital Assets
  9. October 25. Server Security: Protecting Your Digital Core
  10. October 24. Backups: Your Recovery Safety Net
  11. October 23. Filtering and Monitoring
  12. October 22. Hardware: Printers
  13. October 21. Hardware: Asset Management
  14. October 20. Hardware: Safe disposal
  15. October 19. Anti-virus/anti-malware
  16. October 18. Regular Updates: Patching Against Threats
  17. October 17. Access Control: Managing User Privileges
  18. October 16. Access Control: Securing Your Digital Gateways (Wi-Fi & Networks)
  19. October 15. Access Control: Securing Your Home Office (Working From Home)
  20. October 14. Access Control : (Multi-factor authentication)
  21. October 13. Cyber Security Awareness
  22. October 12. Training: Empowering your human firewall
  23. October 11. Policies and Procedures: Cyber Blueprint
  24. October 10. Understanding Your Cyber Posture
  25. Time's Ticking: Windows 10 support ends in October 2025!
  26. October 9. A Guide for Education Providers
  27. October 8. How Can Your Organisation Prevent Ransomware Attacks?
  28. October 7: Under Attack: The Reality of Ransomware
  29. October 6: Cyber Action Plan and A Roadmap to Resilience
  30. October 5: Cyber Responsibilities - We're All in This Together
  31. October 4: When a Cyber Attack Hits
  32. October 3: Data Security, the Core of Protection
  33. October 2: Privacy Protection & Safeguarding Personal Data
  34. October 1: Welcome to Cyber Security Awareness Month!
  35. Nursery Cyber attack
  36. The NCSC Cyber Assessment Framework
  37. Fraud awareness from the DfE
  38. The Classroom's Dark Side: Cyber crime from the Classroom
  39. KCSIE 2025: Data Protection, AI, and Cyber Security
  40. New e-learning for 2025
  41. The Latest Cyber Threat: The "Murky Panda"
  42. Building a Secure School: Using the ICO Accountability Framework to Meet DfE Digital Standards
  43. Digital Safeguarding: DfE announces statutory DfE Digital Standards
  44. Compliance Reporting from the Knowledge Bank
  45. Social engineering + impersonation = Fraud ≡ cyber deception
  46. Data Breaches 2025 Report Highlights
  47. School cyber attack: Framlingham College, Suffolk
  48. Getting caught in the Scattered Spider web
  49. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  50. Social Media and Marketing Guidelines and Training
  51. New Governor Resources
  52. Apple removes its highest level data security tool from UK customers
  53. Safer Internet Day, Cyber Security & Data Protection
  54. The Cyber Resilience Championship
  55. The Multiple Dimensions of Supplier Due Diligence
  56. Blacon High School Cyber Attack
  57. The role of Passkeys in Cyber Resilience and Cyber Security
  58. What the proposed Government legislative proposal around cyber crime means
  59. Effectively communicating during a cyber incident
  60. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  61. Cyber Security Best Practice Area
  62. DfE Digital Standards for Schools and Colleges Tracker
  63. New Policies, Documents, Letters and Posters page
  64. Schools and Trusts Best Practice Area
  65. The DPE Retention Schedule
  66. Making the Rounds Update (now includes reporting)
  67. How does the recent global IT outage affect me?
  68. King's speech introduces new bills in relation to cyber security, smart data and digital information
  69. Out of date technology
  70. What's a Cyber Incident and what should we do?
  71. Cyber attack on a school during half term
  72. Free short cyber training for staff
  73. The rise of cyber attacks in schools are causing pupils to miss classes
  74. ICO: Learning from the mistakes of others report
  75. Children's mental health data leaked after a cyber attack
  76. Cyber attack on a Trust; the aftermath
  77. Social Media Best Practice Area
  78. Lettings Best Practice Area
  79. MFA Bombing - What is it?
  80. Product Focus on Checklists : Initial Trust Plan
  81. Product Focus on Checklists : Information and Cyber Security
  82. Product Focus on Checklists : End of Term Checklist
  83. Product Focus on Checklists : Social Media
  84. Cyber Incident Review: The Benefits
  85. Product Focus on Checklists : Lettings
  86. Product Focus on Checklists : Record of Processing
  87. Why Data Should Stay Put: Benefits of Keeping Data in Its Original System
  88. Product Focus on Checklists : Data Retention and Destruction
  89. Product Focus on Checklists : Data Migration
  90. Product Focus on Checklists : Biometrics
  91. Product Focus on Checklists : Supplier Due Diligence
  92. Free Cyber help, advice and training with the Cyber Resilience Centres
  93. The Perils of Paper: The Printing Vulnerability
  94. Product Focus on Checklists : FOI
  95. Product Focus on Checklists : Governors and Data
  96. Product Focus on Checklists : DPIA
  97. Product Focus on Checklists : Site Moves
  98. Product Focus on Checklists : Data Breaches
  99. Product Focus on Checklists : Subject Access Requests
  100. Cyber attack on a University
  101. Product Focus on Checklists : Bring your own device
  102. Product Focus on Checklists : Working out of school/offsite
  103. Cyber Attack on a School
  104. Product Focus on Checklists : Redaction
  105. Product Focus on Checklists : CCTV
  106. Product Focus on Checklists : Clear desk
  107. Product Focus on Checklists : Commitment to compliance
  108. Product Focus on Checklists : Photos and video
  109. Product Focus on Checklists : Passwords
  110. Product Focus on Checklists : Information Classification
  111. Kent Councils Data Breach
  112. Free cyber training for staff
  113. DfE Digital Standards Update
  114. Where is your data stored?
  115. Phishing attacks targeting schools - alert from City of London Police
  116. The ICO reprimands a Multi Academy Trust
  117. CISA and UK NCSC Announce Joint Guidelines for Secure AI System Development
  118. Trust Initial Plan Checklist Update
  119. Update on Advisory for Rhysida Ransomware
  120. Records Management Best Practice Update
  121. The Crime in a Cyber Attack and a Data Breach
  122. NCSC Annual Review is published for 2023
  123. Learning from Data Breaches
  124. Windows 11 security ineffective against attacks on old devices
  125. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  126. International Counter Ransomware Initiative 2023 Joint Statement
  127. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  128. Top Ten Cyber Security Misconfigurations
  129. ICO Reprimand: company suffered a ransomware attack
  130. The UK Online Safety Bill becomes an Act (Law)
  131. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  132. Ransomware, extortion and the cyber crime ecosystem
  133. Cyber Resource: The Cyber Resilience Centre Group
  134. Email and Security: ICO recent guidance
  135. Help after a Cyber Attack/Incident
  136. What to do in the event of a Cyber Attack
  137. How KCSIE is linked to Cyber Strategy
  138. Cyber Crime: AI Generated Phishing Attacks
  139. Cyber Attack: Exam Boards
  140. VICE SOCIETY - Ransomware attacks on schools
  141. Using Tags if you are a group of organisations in the DPE Knowledge Bank
  142. Where's Harry the Hacker?
  143. Be Cyber Aware: USB Sticks
  144. Cyber Insurance in the Public Sector
  145. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  146. Cyber Attack: Leytonstone School
  147. Be Cyber Aware: Firewalls
  148. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  149. Cyber Attack: Dorchester School
  150. Knowledge Bank Role Types: Admin, Staff and Trustee
  151. Types of Cyber Attacks: Password Attacks
  152. Be Cyber Aware: Why regular software updates are important
  153. Cyber Attack: Wiltshire School
  154. Keeping your IT systems safe and secure
  155. Why we recommend using PIN codes on printers
  156. Types of Cyber Attacks: DDoS Attacks
  157. Types of Cyber Attacks: Phishing
  158. Redaction Guidelines Updated
  159. Types of Cyber Attacks: The Insider Threat
  160. Why your data is profitable to cyber criminals
  161. Using WhatsApp in Schools
  162. Knowledge Bank Updates
  163. Types of malware and how they are linked to data protection
  164. Windows Server 2012 & 2012 R2 Retirement
  165. How to contact us for support, subject access requests, data breaches and FOI's
  166. How a school fought back after a cyberattack
  167. Types of Cyber Attacks - Credential Stuffing
  168. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  169. Assigning courses to staff using to-dos
  170. The Education sector now at highest risk of cyber attacks
  171. Cyber Attacks
  172. Best Practice for Managing Photos and Video
  173. Compliance Manager released
  174. Emails – good practice and minimising the risk of a data breach

Search