Skip to main content
  1. Home
  2. Cybersecurity

Cybersecurity Cybersecurity

Subtopics

Data Breaches Information about Data Breaches Phishing Information about Phishing Ransomware Information about Ransomware

Defend against cybersecurity threats to your school.

All educational institutions are at risk of falling victim to a cyberattack, and in recent years, K-12 schools have been an increasingly frequent target. These attacks can impact a school’s ability to carry out its educational obligations, protect sensitive student and staff data, and provide a safe and secure learning environment for our nation’s youth. 

Our Nation’s students are also spending more time online than ever before, using technology to complete homework, communicate with peers, and engage with teachers and school staff. Our growing dependence on technology systems - coupled with emerging, evolving, and increasingly deceptive cyber threats – demands enhanced awareness and vigilance when it comes to our online world. It is important for schools, parents, and students to stay safe online by taking proactive steps to defend against risks and strengthen cyber safety and security both at home and within schools.

Use the filter below to sort resources available based upon stages of preparedness and subtopic.

Filter Resources

All Cybersecurity Resources

The federal government identified additional resources that highlight strategies for school safety. Use these resources to learn more about cybersecurity.

Webpage
Cybersecurity
Privacy Technical Assistance Center (PTAC)

Department of Education

This webpage provides education stakeholders with information on data privacy, confidentiality, and security practices related to student-level data systems and other uses of student data.

Guidance
Cybersecurity
Cyber Resources Hub

Cybersecurity and Infrastructure Security Agency

This webpage offers a range of cybersecurity assessments that evaluate operational resilience, cybersecurity practices, organizational management of external dependencies, and other key elements of a robust and resilient cyber framework.

Was this page helpful?