
School closes for two days after cyber incident
A secondary school in Cornwall close for two days due to a 'cyber incident'.
The Richard Lander school said it has an issue with affected its IT systems, but there was no evident that personal data had been compromised.
The school is working with the local authority to ensure it has the right support and expertise available to assess the situation.
The school's facebook page has said that the IT systems in the canteen are not functioning causing issues and asked for students to bring packed lunches.
BBC Report 👉 School closed for two days over cyber incident
The school continues to investigate but has very limited access to data.
Quick Cyber Check:
🛡️ Review: Holiday Cheer or Cyber Fear? Essential Pre-holiday checks
🛡️ Ensure Multi Factor Authentication is set up on key systems
🛡️ Continued training and awareness for staff and students
🛡️ Review the DfE Digital Standards
🛡️Our customers can review our Cyber Security Best Practice Area
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
m. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to