
The cyberattack on a British nursery chain represents a troubling trend: threat actors increasingly target the education sector for its trove of sensitive data and lack enterprise-grade security infrastructure. The recent breach compromised personal information for approximately 8,000 children, including photographs of children, medical records and dates of birth, alongside contact details belonging to parents and staff.
The attackers, a group called Radiant, posted samples of children's profiles on the dark web as leverage for ransom demands. Reports indicate they also contacted parents directly, attempting to pressure the nursery into payment. While the threat actors later claimed to have deleted the stolen data and issued an apology, cybersecurity fundamentals tell us that once data is exfiltrated and exposed online, guaranteeing its permanent deletion is impossible. The information may have been copied, traded or archived by other malicious actors.
Understanding the attack surface in education
From an incident response perspective, this breach likely exploited common vulnerabilities in education and resource-constrained organizational settings:
- Inadequate access controls: Multi-factor authentication (MFA) may not have been enforced across all employee accounts.
- Insufficient data encryption: Sensitive information may have been stored without proper encryption at rest.
- Lack of data retention policies: Organizations often retain more data than legally required, expanding their attack surface.
- Limited security monitoring: Without continuous monitoring and endpoint detection capabilities, intrusions can go undetected for extended periods.
- Inadequate backup and recovery: The ability to restore systems and data without paying ransoms depends on tested, immutable backups.
The education and childcare sectors face a particular challenge. They handle exceptionally sensitive data but typically operate with limited IT budgets and resources. This makes them attractive targets for ransomware operators who calculate that the emotional stakes will increase pressure to pay.
The ABCs of implementing cyber protection in education
Organizations handling children's data must implement layered security controls:
Access management
Deploy MFA on all systems containing sensitive data. Implement role-based access controls to ensure staff only access information necessary for their roles. Regularly audit and revoke unnecessary permissions.
Data protection
Encrypt sensitive data both at rest and in transit. Establish clear data retention policies and purge information when no longer legally required. Minimizing stored data reduces exposure risk.
Backup and recovery
Maintain regular, tested backups stored in immutable formats that ransomware cannot encrypt. Implement the 3-2-1 backup rule: three copies of data, on two different media types, with one copy off-site. Natively integrated backup solutions that combine with cybersecurity controls provide the most efficient protection.
Endpoint security
Deploy anti-malware and anti-ransomware protection on all devices. Extended detection and response (XDR) capabilities provide visibility across endpoints, networks and cloud applications to identify threats before they cause damage.
Security awareness
Human error remains a primary attack vector. Staff handling sensitive data need regular security awareness training on phishing recognition, social engineering tactics and secure data handling procedures.
How to protect your family's information
Parents entrusting childcare organizations with children's data should ask direct questions:
- What security certifications does your organization maintain?
- Is MFA required for all staff accessing our data?
- How is sensitive information encrypted?
- What is your data retention policy?
- Do you maintain tested backups?
- What incident response plan exists if a breach occurs?
Request transparency about security practices. Organizations serious about data protection will welcome these questions rather than deflect them.
For personal protection:
Monitor for identity theft If your child's information was compromised, monitor credit reports and consider placing a credit freeze. Children's identity theft often goes undetected for years until they apply for student loans or credit cards.
Review what you share Evaluate what information you provide to schools, childcare providers and extracurricular programs. Provide only what is legally required or operationally necessary.
Secure your own systems Implement strong, unique passwords using a password manager. Enable MFA wherever available. Maintain current backups of family photos and documents. Use comprehensive cyber protection solutions that integrate backup with cybersecurity controls.
The path forward
The incident demonstrates that data breaches are no longer abstract IT concerns. They represent real threats to children's safety, family privacy and peace of mind. The emotional manipulation tactics used by these attackers mark a dangerous escalation in cybercrime.
The most effective attacks often bypass inadequate defenses by targeting the people behind the screens. We must acknowledge that the true vulnerability in the education sector is frequently social engineering. Attackers prey on trust, urgency and the good intentions of parents, educators and support staff, manipulating them into clicking nefarious links and paying ransoms.
Together, we need to shift focus on fostering a culture of healthy skepticism and emotional vigilance. What steps could your school district take to better integrate emotional vigilance into its annual cybersecurity training?
About Acronis
A Swiss company founded in Singapore in 2003, Acronis has 15 offices worldwide and employees in 50+ countries. Acronis Cyber Protect Cloud is available in 26 languages in 150 countries and is used by over 21,000 service providers to protect over 750,000 businesses.