This Months Newsletter
I've included additional support from Hwb on developing a Cyber response plan for your school here.
The following guidance will support you in the event of any cyber incident. As technology develops and becomes an increasingly integral part of your school's procedures, it is essential to have plans in place in case your digital documents are no longer available.
By creating a 'Playbook', your school will have identified the steps to be taken in the event of one or more of your systems becoming unavailable due to nefarious activity.
Follow the steps below and note that under GDPR, you have 72 hours to report any personal data breach to the Information Commissioner's Office (ICO), which can be done here
Your school should identify those individuals who will need to be contacted in the event your school is subject to a cyber incident. Your team should include all those who have responsibility for your school's running and safeguarding. Contact details for those identified should be recorded, so that if school email systems are lost, contact details are recorded.
These should include contact details of:
The School headteacher
Members of the SLT
Governors who have been identified as part of your team
Local Authority contacts - Log alert under TopDesk and mark as Priority 1
School business manager
School technician - note a contact phone number for your school Federated Technician/IT Network Manager
Cyber incident response company/Data Protection Officer
Other members whom the school choose to add
A Cyber Incident can gain access to your digital infrastructure through several ways; those which are most common are:
Through Email, via Phishing emails, with attachments or with links
Malicious Downloads, staff/learners download files which have malware to attack the school's systems
Weak or stolen Passwords, staff or learners with simple passwords which can be guessed, allowing access to school systems
Unpatched software, not updating software, where security patches have been released, or using outdated software without security updates
Ensure Anti-virus software is up to date on devices (your school's Federate Technician can facilitate this)
Infected USB drives, staff or learners using personal storage devices on school devices.
3rd-party Apps, where schools use additional applications which have access to core digital applications
Denial of Service attacks, when the school's website/network is inundated with access requests
Knowing that these are possible aspects which could be used to access your school's infrastructure, there are steps which can be taken to minimise each of those listed above.
Through Email, staff training to understand how the content of an email is used to elicit a response from the receiver and understand that only attachments and links from known senders should be opened, schools working through the Hwb platform have additional security through the filtering provided by the Welsh Government
Malicious Downloads, staff and learners should not be downloading additional software to their school-issued devices
Weak or stolen Passwords, ensure strong passwords are used, and Multi-factor Authentication is applied where possible. Schools using Hwb have MFA applied for their staff as a default.
Unpatched software, ensure that the software is regularly updated, and that out-of-date software is removed from school systems
Infected USB drives, USB drives should no longer be used by school staff or learners unless necessary. Schools should be making use of online storage to avoid the use of USBs
3rd-party Apps, schools should complete due diligence on the 3rd-party applications used and assess the levels of data collection and access which they require. This can be done by your school's Data Protection Officer (DPO) completing a Data Protection Impact Assessment (DPIA)
Denial of Service attacks, schools can ensure their procedures can cope with a failure of their school's website
Your plan should:
Have the contact details of your cyber response team printed out and in a secure place
Have a list of applications/programs which the school uses as part of its daily processes
Identify which of those applications can have MFA activated
Identify the data that each of the applications collects when used, e.g. name/email/address/bank details/medical/phone numbers
Assess and create a possible 'workaround' for an application that is unavailable due to a cyber incident
Ensure the school has a printed list of all suppliers if the school has no access to digital records or the internet
What your school should do as soon as you suspect there has been a cyber incident:
Contact Flintshire Support or Hwb via telephone, depending on the system affected and...
Start to document the incident, times, devices and individuals:
What has led to the incident?
Can it be traced to an individual account or device?
Make a record of any messages from those responsible.
Assess the level of impact on the affected application and the school's processes
NB. It is important that the school has developed a 'No Blame Culture' to avoid any delay in the reporting of any cyber incident.
What your school should do as soon as you confirm there is a cyber incident:
DO NOT TURN OFF THE AFFECTED DEVICE, REMOVE WIFI ACCESS AND ISOLATE TO SUPPORT FUTURE INSPECTION
(unplug the desktop network lead/laptop/Chromebook/iPad, disconnect from wifi access)
DO NOT LOOK TO REPLICATE THE ISSUE ON ANOTHER DEVICE
FOLLOW SUPPORT FROM THE LOCAL AUTHORITY- including when and who to notify at specific stages.
Use your Cyber Response Plan to assess the impact of the Cyber Breach
What to do once your issue is resolved:
Ensure the affected services are accessible again, and where applicable, patches are applied
Ensure that reassurances have been made that the performance is at the level pre-attack
Monitor the performance of the affected applications/tools/programs
What could be done differently to improve procedures?
Were all additional precautions identified in Step 3 taken?
Was the use of time from the initial breach being identified to the next steps as swift as possible?
Based on how the breach occurred, does the school need to reassess the applications/tools which are used to support teaching and learning?
Your school may wish to collate your contact details and complete your checklist using a spreadsheet. This example can be used and adapted for your school. Again, this should be printed off to allow access in the event of a loss of digital processes.
Copies of these documents can be downloaded from here for Google or from here for Microsoft.
The initial template for these documents was taken from Hwb's Guidance on Cyber Response Plans
An extract from the support-
Actions in the event of an incident
Speed is of critical importance during a cyber incident. This will help to protect and recover any systems that may have been affected and help prevent further spread. If the school suspects it has been the victim of a ransomware or other cyber incident, the school should not pay any money demanded.
The school should take the following steps immediately:
enact the school’s own Cyber Response Plan and inform the Chair of Governors
contact the school’s IT partner
inform Hwb
contact the local police via Action Fraud Action Fraud website or call 0300 123 2040
contact the local authority’s 24-hour emergency response team who will in turn contact the Chief Education Officer, the Data Protection Officer and other relevant individuals
contact the school’s Data Protection Officer who will consider whether reporting to the Information Commissioner's Office (ICO) is necessary. There is a 72-hour window to make any report to ICO using their online form or by telephone on 0303 123 1112 (this may be done in consultation with the local authority’s Data Protection Officer)
Training is availible to all Flintshire staff through the Learning@Wales website.
If you have difficulty accessing the course please get in touch. Login details have been shared with your school headteacher and digital lead.
Advice, resources and opportunities for schools and students interested in cybersecurity.
Guidance that helps small and medium-sized organisations prepare their response to and plan their recovery from a cyber incident
A free resource to help organisations rehearse their response to cyber attacks.