Cyber security is a critical component of school safety and risk management. With the increasing reliance on technology for teaching, learning, and administrative purposes, schools face significant risks from cyber threats, including ransomware, phishing attacks, and data breaches. These threats can compromise sensitive student and employee information, disrupt school operations, and create costly financial and reputational damage.
To mitigate these risks, schools must implement a proactive cybersecurity program that aligns with best practices and relevant federal/state compliance requirements. CSRM supports member districts by providing guidance, resources, and tools to strengthen cyber resilience, safeguard data, and ensure continuity of operations.
Key Cybersecurity Risks in Schools
- Phishing & Social Engineering – Staff or students tricked into revealing sensitive information.
- Ransomware– Malware that locks files and demands payment for release.
- Data Breaches – Unauthorized access to student records, financial information, or employee files.
- Unauthorized Access – Weak passwords or poor access controls leading to compromised accounts.
- Third-Party Vendor Risks – Software or service providers with inadequate security practices.
Why Cybersecurity Matters
- Protects student and staff privacy – Prevents exposure of sensitive personal data.
- Ensures operational continuity – Minimizes disruptions to teaching and administration.
- Reduces liability – Compliance with FERPA, Children's Online Privacy Protection Rule ("COPPA"), and state privacy regulations lowers legal risk.
- Supports community trust – Demonstrates a commitment to safeguarding information.
Proactive Cybersecurity Strategies
The following procedures should be taken by occupants to prevent mold and other microbial contamination.
- Risk Assessments – Conduct IT and network vulnerability reviews.
- Staff Training & Awareness – Provide ongoing phishing, password, and safe tech use training.
- Incident Response Plans – Establish procedures for communication and recovery.
- Access Controls – Use MFA, strong passwords, and role-based access.
- Data Protection & Backups – Encrypt data; maintain secure, off-site backups.
- Vendor Oversight – Require cybersecurity assurances in agreements/MOU. If Software/IT services require cyber insurance as part of agreements/MOU.
- Regular Updates & Patching – Keep systems, apps, and security software current.
“Cybersecurity is Everyone’s Job” – Roles in Reducing Risk
Every role can reduce risk:
Teachers & Site Staff
- Lock screens when stepping away.
- Store assessment data securely.
- Incident Response Plans – Establish procedures for communication and recovery.
- Verify last-minute vendor invoice changes with a known contact.
- Use district-approved apps and cloud storage.
Office/HR/Business
- Confirm bank/wire changes using a verified channel.
- Store assessment data securely.
- Restrict PII to “need-to-know.”
- Verify last-minute vendor invoice changes with a known contact.
- Purge redundant files per retention rules.
Tech/IT
- Enforce MFA, device encryption, and patching.
- Maintain asset inventory and backups (offline/cross-domain).
- Configure email and network security; monitor logs.
- Implement geographic controls to outside US countries via firewalls
Leaders
- Champion annual training and recovery drills.
- Resource an incident response plan and communication templates.
District Response Procedures
Examples of District Procedures include, but are not limited to:
- Incident Reporting: Who to contact, hours, and what info to provide.
- Phishing Response: Quarantine, block, reset, notify, ticket.
- Account Compromise: Password reset, MFA re-bind, log review, device scan.
- Ransomware Playbook: Isolate, preserve logs, activate Incident Response (IR) team, law enforcement notification, and rbckups.
Training is essential because it equips staff and students with the knowledge to recognize and prevent digital threats that can compromise sensitive information and disrupt school operations. It strengthens an organization’s overall security posture by promoting safe online behaviors and reducing the risk of cyber attacks. The following includes examples of learning opportunities:
- Annual staff courses (e.g., security awareness, social engineering, and data handling).
- Micro-learning: 2–5 minute refreshers, such as newsletters/staff meetings.
- Table top exercises: quarterly for admin/IT on phishing, data loss, and ransomware.
- Track Training via Sign-in Sheet: Printable roster for in-person sessions.
- Vector Solutions Online Training Courses: CSRM Members have access to a variety of online training that can be assigned to employees.
Have questions or need help?
Please email slc@csjpa.org or contact your CSRM Risk Consultant.
Page owner: Risk Management / Safety & Loss Control
Last reviewed: 11/10/25