The following are still of vital importance and key lessons to learn from the data breaches:
- System backups
- Maintaining fully patched software
- Educating the workforce to recognise social engineering in all its forms. Phishing are other forms of social engineering are still the most likely initial points of entry for hackers.
- Reviewing third-party providers of software and services should also be both a priority and an ongoing process (e.g MOVEit breaches).
- Reviewing your organisation's protocols for dealing with basic breaches and a full blown cyber attack should be a priority.
The full blog and details of the breaches can be viewed: The biggest cyber attacks of 2023
What to do in the event of a Cyber Attack
Tell someone! Report to IT. Report to SLT.Unplug the computer from the internet by removing the ethernet cable or turning the Wi-Fi off. Isolate the infected device and pass to IT
If you are a victim of a ransomware attack we would recommend reporting this to:
Action Fraud: https://www.actionfraud.police.uk/ as well as your data protection officer so they can advise about the data loss or your local police and ask for the cyber crime team or phone 101 and ask for the cyber crime team.
Most cyber crimes like these will also need to be reported to the ICO by your data protection officer. Our customers should email
These incidents should also be reported to the DfE sector cyber team at
Academy trusts have to report these attacks to ESFA.
Where the incident causes long term school closure, the closure of more than 1 school or serious financial damage, you should also inform the National Cyber Security Centre.
Always ensure there are backups you can restore from. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to