Sophos Group Ltd.

09/18/2025 | Press release | Distributed by Public on 09/18/2025 07:04

K-12 schools face cybersecurity risks inside and outside of the classroom

Phishing was the most common access vector for ransomware infections at lower education institutions over the past year

As schools continue to expand their digital footprint, the threat of phishing, spam, and other cyberattacks is increasingly impacting institutions for students up to 18 years old. These institutions may be referred to as primary, elementary, and secondary schools, or collectively as "lower education" or K-12 schools.

The Center for Internet Security reportsthat 82% of K-12 schools experienced a cybersecurity incident between July 2023 and December 2024. And these incidents are costly. According to Sophos' 2025 State of Ransomware in Educationreport, the average cost for an educational institution to recover from a ransomware attack was just under $1M globally, even before considering ransom payments.

As students return to school, administrators and IT teams must stay vigilant against opportunistic threat actors. These attackers aim to exploit any vulnerabilities, putting students, staff, and teachers at risk.

Device and network considerations

Ensuring that systems are protected is the first step to improving a school's resilience to attacks.

Increasing connectivity

Classrooms today rely heavily on technology, with internet-connected learning devices and school-assigned computers and Chromebooks becoming the norm.

Each of these devices may contain hardware and software vulnerabilities that can be difficult to continually patch and keep updated.

The Sophos 2025 State of Ransomware in Education report reinforces the importance of patching. Exploited security vulnerabilities were cited as the cause of 21% of all successful ransomware attacks against educational institutions.

An industry of industries

Technology shifts in schools aren't limited to computers replacing physical textbooks and internet-connected "smart boards" replacing chalkboards. Backend processes are also digital. Schools may host payment processing and data storage systems, as well as other infrastructure. This convergence creates hundreds of digital touchpoints in each school.

As technology becomes more deeply embedded in both learning and administration, the number of potential cybersecurity vulnerabilities increases.

Third-party contracts and external hosting

Schools often rely on third-party contracts for various services, including scheduling, e-learning, and messaging systems. These services may rely on a combination of internal and external hosting or may be fully hosted externally.

The reliance on vendors introduces additional avenues for risk, as these third parties must be responsible for their own security measures to prevent and patch security vulnerabilities. A compromise of the vendor's platform could render services unavailable or could provide access to the school's data.

BYOD and remote learning

Remote learning and the increased prevalence of children having personal cell phones introduce bring your own device (BYOD) considerations. Students may be issued school-administered laptops that they carry between school and home each day, or they may bring personal devices that they connect to the school's network.

These devices can create entry points for attacks. If a student's device becomes infected outside of the school and is then connected to the school's network, the malicious software (malware) could gain access to the network.

The threat of phishing

Spam and phishing are common methods used by attackers to infiltrate school networks. In phishing attacks, a threat actor impersonates a person or organization over email to trick individuals into revealing sensitive information. The 2025 Sophos State of Ransomware in Education report showed it was the top reported technical root cause of ransomware attacks on lower education (22%). Spam involves bulk, less customized emails in a "spray-and-pray" approach.

Email as an attack vector

Many students are assigned their own email addresses when they reach an appropriate age. This practice could result in phishing affecting students as young as six years old. New to digital learning, young students are more likely to unknowingly click on malicious links, download malware, create easily guessable passwords, and reuse passwords. Without robust security and authentication, they can unwittingly open the door to devastating ransomware attacks.

Phishing beyond email

Phishing scams have evolved, now targeting users on social media platforms, streaming services, and subscription services. These platforms and services are popular among K-12 students, who may use school-provided devices to try to access these services (or spoofed versions of them) outside of learning hours. These scams can impersonate well-known companiesto deceive users into providing sensitive personal information.

These attacks can be extremely costly. According to the Sophos 2025 State of Ransomware report, which encompasses all industries, K-12 schools have the highest recovery costs among industries, averaging $2.28 million. This amount doesn't include any ransoms paid by victims.

Limited resources, expanding risks

Schools and educators are facing numerous challenges, including larger class sizes, shrinking budgets, and limited resources. Additionally, the Information Commissioner's Office has reported a rise in cyber attacks in schools in the U.K.stemming from insider threats, particularly from students who may inadvertently or maliciously compromise school networks. Making sure that technology is operating correctly for staff and students can consume most of the available IT resources. Additionally, there is little the IT team can do to control students' digital activities once students are outside the classroom and the school's network protection.

The general 2025 State of Ransomware report found that 42% of lower education (K-12) schools reported challenges in detecting and stopping attacks in time. This underscores the critical need for proactive measures to prevent attacks before they occur. The education sector's rate is comparable to other industries, such as energy, oil/gas, and utilities at 43%, and manufacturing and production, highlighting the widespread nature of this issue.

How K-12 schools can better guard against cybersecurity threats

As K-12 schools increasingly embrace digital learning, they also face growing cybersecurity risks that threaten student privacy, disrupt operations, and strain IT resources. To stay ahead of evolving threats, administrators and IT teams must adopt a prevention-first mindset - one that combines robust security controls, continuous education, and strategic partnerships.

  • Prevent attacks before they start: Sophos emphasizes the importance of stopping threats before they cause harm. Schools can reduce the risk of ransomware and other malware by implementing layered security controls and teaching students and staff to recognize and avoid risky behaviors. For example, deploying a third-party email security solution like Sophos Emailcan help scan messages for malicious URLs and QR codes, blocking phishing attempts before they reach inboxes.
  • Empower users with strong authentication: Requiring multi-factor authentication (MFA) or passwordless access helps students and staff take ownership of their digital security. However, because students may seek workarounds, ongoing education and monitoring are essential to ensure these measures are effective.
  • Leverage free and low-cost resources: Budget constraints shouldn't be a barrier to better security. Schools can tap into free or subsidized services to strengthen their defenses. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) offers a list of resources, and programs like the Federal Communications Commission E-Rate subsidiesand the U.K.'s National Cyber Security Centre's free cyber defense service for schoolsprovide valuable support.
  • Coordinate and simplify IT strategies:With sprawling IT environments, schools must unify their cybersecurity strategies to close visibility gaps and reduce risks. A coordinated approach helps prevent adversaries from exploiting weak links across systems and campuses.
  • Extend capabilities through trusted partnerships:Ransomware places a heavy burden on IT teams. Schools can relieve pressure and enhance their response capabilities by partnering with providers for managed detection and response (MDR) services, ensuring 24/7/365 coverage and expertise.
  • Prepare for incidents with strong response plans:Even with strong prevention, incidents may still occur. Schools should build robust incident response plans, conduct simulations, and ensure readiness with continuous monitoring and support services like MDR. Use our free Incident Response Planning Guideto get started.

These recommendations are backed by Sophos' work protecting thousands of educational institutions, as well as findings from the 2025 Sophos State of Ransomware in Education report, based on a vendor-agnostic survey of 441 IT and cybersecurity leaders across 17 countries. The report highlights the real-world impact of ransomware on both lower and higher education institutions and offers actionable insights for building resilience.

Download the full report on Sophos.com.

Share this:

  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • More
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to print (Opens in new window) Print
  • Click to email a link to a friend (Opens in new window) Email
Sophos Group Ltd. published this content on September 18, 2025, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on September 18, 2025 at 13:04 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at [email protected]