Help One Hundred Schools

Your School Has Been Breached: Now What?
Cyberattacks are no longer a distant threat—they’re a growing reality for independent schools. In this episode, Mikel Pearce, Director of Business Development at CyberClan, joins host Karl Boehm to break down what schools need to do before, during, and after a cyber breach.
If you’re a school leader, administrator, or IT decision-maker, this episode will give you clear next steps to strengthen your school’s defenses and prepare for the unexpected.
What’s Covered: 1. The Growing Threat to Schools- Why schools—regardless of size—are prime targets for cybercriminals.
- Real-world examples of breaches and their devastating impacts.
- How to identify a breach (e.g., locked systems, ransom demands).
- The critical first actions: Disconnecting systems, preserving logs, and activating your incident response team.
- Legal and ethical considerations when facing a ransom demand.
- The risks of paying (or not paying) and how sanctions laws may limit your options.
- How to inform staff, parents, and students without email access.
- Crafting transparent messaging to maintain trust.
- The importance of offline, air-gapped backups.
- Employee training to prevent phishing attacks (the #1 breach vector).
- Why investing in cybersecurity now is cheaper than recovering later.
- Assume You’ll Be Targeted—No school is “too small” for cybercriminals.
- Disconnect First—Unplug from the internet immediately to limit damage.
- Never Turn Off Devices—Preserve logs for forensic investigation.
- Plan Communications Now—Have a mass-text system or WhatsApp group ready.
- Start Small, But Start—Even basic email security and staff training reduce risk.
- CyberClan’s Website: CyberClan.com
- Connect with Mikel Pearce: LinkedIn
- Visit the Podcast Website: Help100Schools.com
- Listen to the Full Episode: Click here to play
Has your school faced a cyber incident? Share your lessons learned in the comments or tag us on social media!
Subscribe for more episodes on school leadership, risk management, and cybersecurity.