Schools & MATs

 A blue graphic with three children peering over a dark blue banner. The banner has white text that reads "Back to School Basics: Data Protection & Cyber Security." To the left of the text is a stack of school books with a red apple on top. To the right is a laptop displaying a logo with the text "Data Protection Education."

Back to School Basics for Data Protection and Cyber Security Compliance

As schools begin to welcome back students, staff and new joiners, the focus is on the new academic year: curriculum planning, safeguarding and operational logistics.  An equally critical and statutory area that demands attention is data protection and cyber security compliance.  Adhering to data protection law isn't just about avoiding fines; it's about protecting sensitive personal data of children, their families and staff.

Read more …

 A stylized image of a panda wearing a dark suit and tie, standing in a bamboo forest. The background is a mix of digital circuit patterns and glowing lights. At the bottom, a graphic overlay with the text, "IS THERE A 'MURKY PANDA' ON THE TIMETABLE? THE LATEST CYBER THREAT." The logo for "D NEWS" is in the bottom right corner.

The Latest Cyber Threat: The "Murky Panda"

The Murky Panda (also known as Silk Typhoon) is a cyber threat that has had significant activity since 2023 and has targeted government, technology, academic, legal and professional services. Currently there are reports of the threats only in North America, however, as the Murky Panda has previously targeted compromises in the cloud, it is assumed that they will easily transition to attacks further afield. The threat group is a China-nexus group

Read more …

 A detailed flowchart titled "Accountability Framework" showing how the ICO (Information Commissioner's Office) framework and DfE (Department for Education) Digital Standard Trackers align. The central hub is "Accountability Framework" with ten radiating branches, each representing a key area: Leadership & Oversight, Risk Management, Policies & Procedures, Individual Rights, Response & Enforcement, Monitoring Verification & Reporting, Transparency, Records Management & Security, Contracts & Data Sharing, and Training & Awareness. Each branch connects to a box labeled "DfE Digital Standard Trackers," with several icons and checklist boxes underneath. The bottom of the image lists various tools and resources, including "Best Practice Library," "Retention Schedule," "Phishing simulations," "Risk Register," and "Accountability Tracker," which are all linked to the main framework. The overall image illustrates a comprehensive system for achieving and tracking data protection compliance in an educational setting.

Building a Secure School: Using the ICO Accountability Framework to Meet DfE Digital Standards

The ICO Accountability Framework is a crucial tool for any organisation handling personal data, providing a structured approach to data protection compliance. When applied to the Department for Education (DfE) Digital Standards, it becomes a powerful mechanism for schools and trusts to ensure their technology and data practices are not only efficient but also legally compliant and secure.

Read more …

AI generated photo of the back of a  computer screen with hands on a keyboard. Blue padlock with white text saying: Not everyone should have access.  White background and black text: The key to protecting sensitive data : least privilege. Recent dismissal case in Nottinghamshire

Not everyone needs access: The Key to Protecting Sensitive Data

🚫🔒 Sensitive data requires a higher level of security under UK GDPR because of its potential to cause significant harm to individuals if it is lost, stolen or misused.  A recent case of a teacher losing their job after accessing a safeguarding report and transcribing it to her personal computer highlights the both the importance for least privilege access and continual review of access.

Read more …

  1. School cyber attack: Outwood Academy, Middlesbrough
  2. Alert: Schools receiving Microsoft File Sharing Phishing Emails
  3. School cyber attack: Framlingham College, Suffolk
  4. West Lothian Schools in Cyber Attack
  5. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  6. New Governor Resources
  7. Are teachers using AI? 83% say its a time-saver
  8. DfE Digital Standards - narrowing the digital divide
  9. Arbor AI - On By Default
  10. DfE Guidance: Choosing a new MIS
  11. How to verify visitors the right way
  12. Short Guide to AI Video
  13. Safer Internet Day, Cyber Security & Data Protection
  14. The Cyber Resilience Championship
  15. The Multiple Dimensions of Supplier Due Diligence
  16. School shares sensitive pupil information as part of an FOI response
  17. Blacon High School Cyber Attack
  18. WhatsApp and FOI's: ICO Warnings
  19. New AI Guidance from the DfE
  20. What the proposed Government legislative proposal around cyber crime means
  21. DfE update to record keeping and management
  22. Update to data sharing for school immunisation programmes
  23. SLT Digital Lead Profile
  24. The role of governors in cyber security and data protection
  25. Navigating Privacy at the End of Term , Special Occasions and End of Year
  26. South East Technological University has experienced a cyber incident
  27. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  28. Cyber Attack on a Special School
  29. Stealing children's data
  30. Ofqual highlights the value of cyber security training in schools
  31. Fylde Coast Academy Trust Cyber Attack This Week
  32. Calling all IT leads in schools and mult academy trusts!
  33. Ransomware cyber attack on a school in Bromley
  34. School hit by Cyber Attack
  35. DfE Digital Standards for Schools and Colleges Tracker
  36. Schools and Trusts Best Practice Area
  37. ESFA Cyber Essentials Requirement for Colleges from 2024/2025
  38. ICO Reprimands a School
  39. Out of date technology
  40. Data Retention and the Pupil File
  41. Have you assigned your SLT Digital Lead yet?
  42. What's a Cyber Incident and what should we do?
  43. Getting Started with AI (Artificial Intelligence)
  44. Cyber attack on a school during half term
  45. Update to the DfE Digital Cyber Security Standards for Schools and Colleges (May 2024)
  46. The rise of cyber attacks in schools are causing pupils to miss classes
  47. Cyber attack on a Trust; the aftermath
  48. School Focus: The Vale Federation | Aylesbury
  49. DfE Dealing with Subject Access Requests (SARs) Guidance
  50. Update to the Guidance on Information Sharing from the DfE
  51. Product Focus on Checklists : Initial Trust Plan
  52. Product Focus on Checklists : End of Term Checklist
  53. Product Focus on Checklists : Social Media
  54. Product Focus on Checklists : Lettings
  55. Milk Island: The secret location that allows children to view restricted content on Google Maps
  56. Free Cyber help, advice and training with the Cyber Resilience Centres
  57. The Perils of Paper: The Printing Vulnerability
  58. Product Focus on Checklists : Governors and Data
  59. Product Focus on Checklists : Site Moves
  60. Cyber attack on a University
  61. Product Focus on Checklists : Bring your own device
  62. Product Focus on Checklists : Working out of school/offsite
  63. Cyber Attack on a School
  64. Major cyber-criminal gang Lockbit brought down by UK Law Enforcement
  65. Product Focus on Checklists : Photos and video
  66. Safer Internet Day 2024
  67. Kent Councils Data Breach
  68. Free cyber training for staff
  69. DfE Digital Standards Update
  70. ClassCharts Possible Data Breach
  71. School Focus: St Bernadette's Catholic Primary School | Brighton
  72. Guardians of Privacy: 16. Social Media Checklist
  73. Guardians of Privacy: 15. Navigating Social Media in Educational Settings Summary
  74. Guardians of Privacy: 14. Social Media and Cyber Bullying
  75. Guardians of Privacy: 13. Social Media, Copyright and Intellectual Property
  76. Guardians of Privacy: 12. Social Media and Going Viral
  77. Guardians of Privacy: 11. Staff Social Media Accounts
  78. Guardians of Privacy: 10. Social Media and Cookies
  79. Guardians of Privacy: 9. Social Media and Morality
  80. New Resources for Schools from the ICO
  81. Guardians of Privacy: 8. Social Media Policies
  82. Guardians of Privacy: 7. Social Media Data Retention
  83. Guardians of Privacy: 6. Posting Safely
  84. Guardians of Privacy: 5. Social Media and Consent
  85. Guardians of Privacy: 4. Social Media Access Control
  86. Guardians of Privacy: 3. Social Media Channels
  87. Guardians of Privacy: 2. Law and Regulations
  88. Guardians of Privacy: 1. Social media, privacy and children
  89. Phishing attacks targeting schools - alert from City of London Police
  90. The ICO reprimands a Multi Academy Trust
  91. Guidance for the use of school email and applying email retention in schools
  92. Data Protection Tips for Early Years Settings
  93. Trust Initial Plan Checklist Update
  94. Update on Advisory for Rhysida Ransomware
  95. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  96. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  97. Lettings Best Practice and Guidance
  98. The UK Online Safety Bill becomes an Act (Law)
  99. Considerations when migrating to a new MIS
  100. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  101. Public bodies and sensitive data
  102. ICO: 10 Step guide to sharing information to safeguard children
  103. Email and Security: ICO recent guidance
  104. Social Media Policy
  105. Data Protection and Cyber Security (Inset Day) Training Ideas
  106. Changes to Microsoft Free Licensing for Schools
  107. What to do in the event of a Cyber Attack
  108. How KCSIE is linked to Cyber Strategy
  109. VICE SOCIETY - Ransomware attacks on schools
  110. Using Tags if you are a group of organisations in the DPE Knowledge Bank
  111. Cyber Insurance in the Public Sector
  112. Cyber Attack: Leytonstone School
  113. The ICO Reprimands a school
  114. Cyber Attack: Dorchester School
  115. Knowledge Bank Role Types: Admin, Staff and Trustee
  116. Cyber Attack: Wiltshire School
  117. Types of Cyber Attacks: The Insider Threat
  118. Why your data is profitable to cyber criminals
  119. Striking Data Breach
  120. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  121. FOI: Vaccination Justifications
  122. The Education sector now at highest risk of cyber attacks
  123. Schools Blocked from Using Facial Recognition Systems
  124. The Children's Code
  125. Cyber Attacks
  126. Protocol for Setting Up and Delivery of Online Teaching and Learning
  127. Class Dojo International Data Sharing
  128. Secure file transfer of files using Royal Mail
  129. Emergency contacts and consent
  130. Best Practice for Managing Photos and Video
  131. Headteacher fined for breach of data protection legislation

Search