Resources and Practical Steps - What Schools Can Actually Do Right Now

This is part 4 of our week-long series based on The Small Business Cybersecurity Guy podcast. - Authentrend sponsors this episode.

Moving from Awareness to Action

We've covered the Kido breach, the 2025 safeguarding guidance, and the MFA reality check. Now it's time for the practical question: what should schools actually do? Where do they start?

The good news: You don't need enterprise-grade SIEM solutions. You need practical, accessible guidance written specifically for schools with no IT budget and maybe one part-time technician.

Start with the NCSC Cyber Assessment Framework

The National Cyber Security Centre has created the Cyber Assessment Framework (CAF) specifically for small businesses and schools. It's guidance and best practice written in accessible language, not technical jargon.

As one cybersecurity expert noted: "Yes, the NCSC, National Cyber Security Centre, has created the Cyber Assessment Framework specifically for small businesses and schools. It's guidance and best practice written in accessible language, not technical jargon. Mauven, did you use this framework in your former life?"

The CAF is brilliant. It's designed to be practical. Not "implement enterprise-grade SIEM solutions," more like "here's how to think about security at your scale." It's exactly what small organizations need.

The Essential Elements

The CAF encompasses aspects such as user access control, incident management, and supply chain security. And it's free. A school business manager can work through it, though you'll probably need IT support to actually implement the recommendations.

What the CAF Covers:

  1. User access control

  2. Incident management

  3. Supply chain security

  4. Risk assessment

  5. Asset management

  6. Security monitoring

Exactly. It encompasses aspects such as user access control, incident management, and supply chain security. And it's free. A school business manager can work through it, though you'll probably need IT support to actually implement the recommendations.

What About the MFA Problem?

Schools that are struggling with phone-based authentication should discuss alternatives with their IT provider: hardware tokens, authenticator apps on shared devices. There are solutions, but you need to actively ask for them. Don't let the phone rule be an excuse for not having MFA enabled. If it's not set for everyone with system access, you're not protected.

For the phone policy conflict, FIDO2-certified hardware security keys offer an elegant solution. These small devices (available from providers like Authentrend, Yubico, and others) work without phones, can be worn on lanyards, and satisfy both security and safeguarding requirements. They're often more user-friendly than phone-based MFA for staff who aren't tech-savvy.

As one expert emphasized: "Schools that are struggling with phone-based authentication? Tammy, you work with schools on this every day. Discuss alternatives with your IT provider: hardware tokens, authenticator apps on shared devices. There are solutions, but you need to actively ask for them. Don't let the phone rule be an excuse for not having MFA enabled. If it's not set for everyone with system access, you're not protected."

The GitHub Audit Issue

And the GitHub issue? How do schools check if they have any possible exposed code repositories?

Step-by-Step GitHub Audit:

  1. Begin by identifying any custom software you currently use - The easy way is that if two elements or applications seem to be talking to each other, and the fact that they can is not a documented feature, then you probably have built in several scanning for public repositories.

  2. Use GitHub's search functionality - Doesn't cost anything. You just need to know how to look. Which is why schools need to audit everything. Every platform, every integration, every custom script. Everything that touches children's data.

  3. Look for organizational repositories - Search for your school or organization name.

  4. Check personal accounts - Former staff may have created repositories under personal accounts that still contain school credentials.

  5. Examine third-party applications - Middleware solutions could be a 3rd party application you are paying for, in which case there should be a paper trail (invoices etc) or maybe custom code. If it's custom code, someone wrote it, which means there should be a paper trail (an invoice or a maybe custom code).

It's Overwhelming, Mauven. Which is Why I Keep Saying This Needs to Be Statutory with Proper Funding

Until it's Ofsted-ed or explicitly required by law with consequences, it'll remain optional in practice for many schools. The safeguarding link gives us hope, but it needs to be enforced. And schools cannot ignore safeguarding.

But the safeguarding link gives us weight now. It does. And I'm hoping that will be the turning point. Because schools cannot ignore safeguarding.

What Parents Should Be Asking

Parents now have legitimate safeguarding grounds to ask schools direct questions about cybersecurity. These aren't invasive IT audits. These are reasonable safeguarding questions:

Questions Parents Can Ask:

  1. Do you have MFA enabled for everyone? How will do staff get cybersecurity training?

  2. Do you have any custom software? If so, where is the code stored?

  3. Where is your incident response plan, and when was it last tested?

They might not like those questions, but they need to hear them. Because the alternative is being the next Kido, and nobody wants that. And now that cyber is officially part of safeguarding, parents have every right to ask these questions.

The Small Wins Matter

Final thought? And maybe ask your child's school what security they actually have in place. These aren't technical questions. They're safeguarding questions now.

[Final thought] And maybe ask your child's school what security they actually have in place. Please don't wait for them to be the next headline.

Practical Implementation Roadmap

Month 1: Assessment

  • Download the NCSC Cyber Assessment Framework

  • Conduct a GitHub repository audit

  • Document all custom software and integrations

  • Survey current MFA implementation

Month 2: Quick Wins

  • Enable MFA for all users (no exceptions)

  • Rotate all credentials organization-wide

  • Remove or document all custom code

  • Update incident response plan

Month 3: Governance

  • Add cybersecurity to safeguarding meeting agendas

  • Ensure governors understand their responsibilities

  • Verify IT provider is meeting standards

  • Begin staff training on security awareness

Ongoing:

  • Regular credential rotation (quarterly minimum)

  • Annual security audits

  • Continuous staff training

  • Monitor for new vulnerabilities

The Resources You Actually Need

Free Government Resources:

  1. NCSC Cyber Assessment Framework - ncsc.gov.uk/collection/caf

    • The foundation for school cybersecurity

    • Written for non-technical audiences

    • Practical, actionable guidance

  2. Keeping Children Safe in Education 2025 - gov.uk/government/publications/keeping-children-safe-in-education--2

    • Paragraph 144 on cybersecurity standards

    • Links to filtering and monitoring guidance

    • Digital standards references

  3. Plan Technology for Your School - Available via gov.uk

    • Self-assessment service

    • Personalized recommendations

    • Helps meet digital and technology standards

  4. DIE Digital Standards - Search for webinars and training

    • Regular updates on requirements

    • Practical implementation guidance

Data Protection Education Resources:

For anyone who wants to get in touch with Tammy or Data Protection Education:

  • LinkedIn: search for Tammy Buchanan, Data Protection Education

  • Website: has a LinkedIn page where articles and resources are published

  • DIE Digital Standards webinars: explaining the standards in simple terms and how schools can track progress

Additional Support:

  • Visit the blog at thesmallbusinesscybersecurityguy.co.uk for more resources

  • Full breakdown of the repository screenshot and Tammy's key points

  • Changes to the safeguarding guidance details

It's Not as Expensive as You Think

Here's what many schools don't realize: Most of these recommendations don't require massive budgets. The NCSC guidance is free. MFA is often included in existing licenses. Credential rotation costs nothing but time.

The expensive part is if you don't do these things and suffer a breach. Then you're looking at:

  • ICO fines

  • Reputation damage

  • Legal costs

  • Recovery expenses

  • Lost trust from parents

Prevention is always cheaper than cure, especially in cybersecurity.

The Bottom Line

Schools have the resources. They have the guidance. What's needed now is the will to implement it and the understanding that cybersecurity is no longer optional. It's safeguarding, it's statutory, and it's essential.

Start with the CAF. Enable MFA for everyone. Audit your GitHub. Ask the hard questions. And most importantly, don't wait for the next headline to prove why this matters.

Key Takeaways

  • The NCSC Cyber Assessment Framework is free and designed specifically for schools

  • Start with quick wins: MFA for everyone, credential rotation, GitHub audits

  • Parents can now ask cybersecurity questions as legitimate safeguarding concerns

  • Most recommendations don't require massive budgets, just implementation

  • The cost of prevention is always less than the cost of a breach

Source Title Date
National Cyber Security Centre Cyber Assessment Framework October 2025
UK Department for Education Plan technology for your school September 2024
UK Department for Education Keeping Children Safe in Education 2025 October 2025
Data Protection Education Tammy Buchanan - LinkedIn Profile October 2025
UK Department for Education DIE Digital Standards October 2025
GitHub GitHub Repository Search October 2025
National Cyber Security Centre NCSC Training Resources October 2025
Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Next
Next

The MFA Reality Check - Why Only 30% of Schools Have It Properly Enabled