This guide covers the complete cyber security landscape for UK schools, academies, and multi-academy trusts — the specific threats, regulatory obligations, and practical controls that every school and trust should have in place. It is written for headteachers, business managers, trust CFOs, and IT leads who need a clear, actionable view of what security looks like for an educational setting.
The Education Sector's Specific Threat Profile
Schools face a threat profile that differs from most commercial organisations in two important ways. First, holiday periods — when schools are operationally quiet — are the highest-risk times for attacks, because monitoring capability is reduced and the pressure to restore systems before pupils return creates maximum ransomware leverage. Second, the combination of sensitive data categories that schools hold — safeguarding records, SEND information, medical conditions, pupil personal data, and staff HR records — means that a breach affects some of the most vulnerable individuals in the most sensitive ways.
Securing the Management Information System
The school MIS — SIMS, Arbor, ScholarPack, Bromcom, iSAMS, or WCBS — is the operational heart of the school. It holds pupil records, attendance data, safeguarding flags, parent contact information, and for secondary schools the complete examination and assessment record. Its unavailability is an operational emergency.
Implement role-based access within the MIS. Teaching staff do not need access to financial records. Administrative staff do not need access to full safeguarding records beyond their specific role. The DSL needs immediate access to safeguarding records — and should have a documented offline fallback for accessing active cases if the system is unavailable. MIS administrator accounts should be separate from general user accounts and protected by MFA.
Confirm the correct backup procedure with your MIS provider. SIMS and other on-premise systems require database-level backups that are distinct from file-level backups of the server. Cloud-hosted MIS systems may have their own backup arrangements — confirm what these cover and what the recovery time is for a complete restore.
Backup Strategy for Schools
The 3-2-1 rule applies with particular force in an educational setting. Three copies of all critical data. Two different media or locations. One copy genuinely offline and inaccessible to ransomware.
Critical data for a school's backup includes: the MIS database, safeguarding records (including a current offline copy accessible to the DSL without network access), staff HR records, financial records, SEND support documentation, the school's network and system configuration, and email archives for the headteacher and business manager. Each of these has a specific regulatory or operational requirement that makes its recovery following an incident essential.
For MATs, backup strategy should be defined at trust level and implemented consistently across schools. A trust that discovers that some schools have adequate backups and others do not — typically revealed during an incident affecting multiple schools simultaneously — has a governance failure as well as a technical one.
Network Configuration: Schools Are Not Flat Networks
Many school networks, particularly in older buildings or smaller schools, are configured as flat networks — everything on the same segment. This maximises the blast radius of any compromise: a ransomware-infected pupil device can reach staff computers, the MIS server, the network-attached storage, and the backup system simultaneously.
Network segmentation — separating pupil devices from staff devices from server infrastructure — is a proportionate and achievable control for most schools with managed switching equipment. At minimum, the MIS server and backup systems should be on a segment that pupil devices cannot reach. A school that allows pupils to bring personal devices onto the network (BYOD) should have these devices on an isolated guest network with no access to school systems.
Staff Training: Education-Specific Scenarios
Annual cyber security awareness training is a DfE standard requirement. Training should explicitly cover the scenarios most likely to affect school staff:
- Phishing emails impersonating DfE, Ofsted, the Local Authority, or ESFA — creating urgency around an inspection, funding submission, or compliance matter
- Fake Microsoft or Google notifications targeting staff email accounts
- Social engineering calls from someone claiming to be technical support for the MIS provider
- Requests from apparent parents or pupils for data or record access via email
- Safe disposal of printed documents containing pupil or safeguarding information
The MAT Model: Centralised Security, School-Level Visibility
For multi-academy trusts, the most efficient security architecture is one where protection is standardised at trust level while visibility and reporting are available at both school and trust level. This means: a consistent security baseline applied to every school, trust-level monitoring that covers all schools simultaneously, and reporting that allows the trust's audit and risk committee to see the security posture of each school and the trust as a whole.
The cost-per-school of this model is significantly lower than attempting to procure separate security services for each school. A trust with five schools, each with 20 to 30 assets, is buying five Small plan deployments — five named analyst assignments, five Cyber Essentials certifications, and five monthly Confidence Score reports — under a single service arrangement with one point of contact.
Holiday Period Planning
The heightened attack risk during holiday periods requires specific planning. Before the end of each term: confirm that all patching is current, verify that backup systems are working and the most recent backup is offline or immutable, confirm that the security monitoring service has current emergency contact details for the IT lead and headteacher, and ensure that the IT lead or a designated deputy is reachable during the holiday period for urgent incident response.
The scenario where ransomware is discovered on the first day of the summer holidays — with IT staff unavailable, contractors unreachable, and a six-week return-to-school deadline — should be in every school's business continuity plan, with specific roles and actions assigned to named individuals.
Further Reading
Protecting Every Pupil Record, Every School, Every Day.
SOC in a Box is used by multi-academy trusts across the UK — one appliance per school, centralised trust-level oversight, and individual school Confidence Score reports. DLP policies pre-configured for safeguarding and pupil data. Cyber Essentials certification for each school. Holiday-period monitoring the same as term-time. Five working days per school from order to live.
Book a scoping callDownload This Guide as a PDF
Get a copy of this complete guide to keep, share with colleagues, or read offline.
Download PDF