12 Cybersecurity Practices your District Should Already Have in Place

22 Apr 2026 5 min read
Duane Shaffer
Duane Shaffer
Director of Technology Services, Learning Technology Center
Sam Fishel
Sam Fishel
Digital Content Manager, Learning Technology Center

Safeguarding mission critical networks and data is a paramount priority for any K-12 school. Here in Illinois, public schools are required to “implement and maintain reasonable security procedures and practices that […] protect covered information from unauthorized access, destruction, use, modification, or disclosure.”

At a glance, that can feel like a high bar to reach. After all, what policies and procedures are considered “reasonable” when cyber attacks targeting schools are increasing in frequency and complexity?

K-12 leaders like you don’t need to start from scratch. Here are a few practices every district should implement to meet SOPPA obligations and reduce the risk of a cyber attacks interrupting day-to-day operations.

Wait…I Already Did This!

SOPPA has been a requirement for Illinois schools for 5 years now, so there’s a good chance you’ve bolstered your school’s cyber defenses recently.

Unfortunately, resilient cybersecurity is not a set-it-and-forget-it pursuit.  Threats evolve, staff turn over, and the tools your district depends on change semester to semester. Constant reevaluation ensures your defenses remain sharp and ahead of emergent cyber threats (such as AI-powered phishing and ransomware).

No matter how often you recheck your district’s cyber defenses, these practices can ensure you remain on track toward success and in-line with globally recognized standards.

Cybersecurity Best Practices for Schools

There’s no time like the present to reinforce your district’s digital defense. These actionable practices ensure you’re addressing vulnerabilities in every phase, from data governance to stress-testing:

Taking Stock

To protect what you have, you have to know what you have. That starts with an asset inventory.

An asset inventory is a great starting point for evaluating cyber readiness because it offers an accurate, up-to-date perspective on every device and piece of software in your environment — end-user devices, network equipment, IoT devices, servers, cloud services, and every application your staff and students touch.

Inventories aren’t just a useful awareness tool. Using your inventory, you can also address unauthorized assets on a weekly basis. Trimming out unauthorized devices and software annually isn’t enough; a weekly cadence prevents threat actors from gaining a foothold and using it to wedge open a more serious vulnerability.

Governance, For Now and Later

Data protection isn’t solely a technical challenge; proper data governance is also essential for managing expectations about how data is stored, who can access it, and how it’s protected at rest.

Districts need a documented data management process that addresses sensitivity, ownership, handling, retention, and disposal. For example, access control lists should be configured based on need-to-know, not convenience. Sensitive data should also be encrypted at rest.

Fully-fledged governance expands beyond the IT department’s purview, too. In conversation with school and district leadership, be prepared to ask (and enforce): Who owns student data in your district? Who decides how long records are retained? Who reviews access permissions when a staff member changes roles or leaves?

Stay Active with Account Management

Dormant or compromised accounts are a threat to hits close to home. Data breaches in schools are often caused by internal practices, not external hackers. Former employees retaining system access, excessive staff permissions, weak passwords, shared logins — these are the everyday realities that create exposure.

Active account management helps close that gap on an ongoing basis. Maintaining an inventory of all accounts, disabling dormant accounts after 45 days of inactivity, and restricting administrator privileges to dedicated admin accounts can all go a long way toward stopping unauthorized access before it starts.

Finding the Gaps (Before Someone Else Does)

Why wait until a curious (or malicious) individual to find cracks in your district’s defenses? Periodic penetration testing offers an active assurance that your cybersecurity procedures aren’t just effective in theory, but actually operate as intended in practice.

Establishing a program and conducting annual external and internal tests is a great place to start. That being said, this practice is often deferred because of cost or complexity. If you need an extra reason to push for it, remember that penetration testing most directly answers the question every superintendent should be asking: Could someone actually get in?

A Starting Point, Not a Ceiling

Keeping up with cybersecurity best practices doesn’t stop here. Our team of K-12 cybersecurity professionals has curated 48 cybersecurity best practices that your district can pick up and use today to build an effective baseline.

These recommended practices were made with your goals in mind. They align with CIS and NIST frameworks, reflect the realities of K–12 environments, and map directly to SOPPA’s statutory requirements. Download the full checklist for free to explore them for yourself.

Of course, a checklist is only as good as the discipline behind it. Now is always the right time to review your asset inventory, test incident response plans, and ask your vendors hard questions about breach notification timelines.

Our team is ready to help you at every stage, from evaluation to implementation. Schedule a technology environment or cybersecurity audit today to gain an outside perspective and a tailored upgrade plan – all at little to no cost.

Duane Shaffer
Duane Shaffer
Director of Technology Services, Learning Technology Center

Duane leads and supports events, programs, and initiatives related to network infrastructure, data privacy, cybersecurity, technical support, and technology services.

Sam Fishel
Sam Fishel
Digital Content Manager, Learning Technology Center

Sam leads and supports the execution and growth of LTC services through the development and creation of innovative, impactful, and timely digital content.