Resources/Threat Intelligence
Guide16 pages

Phishing Awareness Kit for Schools

Training materials for faculty and staff on identifying phishing attempts. Includes simulated phishing examples common in education, reporting procedures, and quick-reference cards.

01

Why Schools Are Targeted

School districts are disproportionately targeted by phishing campaigns for several structural reasons that are unlikely to change in the near term. First, staff email addresses are overwhelmingly public information — posted on school websites, included in online directories, and available through public records requests. This gives threat actors a comprehensive, verified email list for every district in the country without any reconnaissance effort.

Second, K-12 phishing campaigns follow predictable seasonal patterns that allow attackers to craft highly contextual lures. August and September bring back-to-school phishing waves impersonating district IT departments with fake account setup and password reset messages. October through December target benefits enrollment with fraudulent health insurance and retirement plan communications. January through March is the peak W-2 phishing season, when attackers impersonate superintendents or HR directors requesting employee tax documents. April and May coincide with budget approval and vendor payment cycles, generating BEC attempts targeting finance staff.

Third, the hierarchical culture of school districts makes them particularly susceptible to authority-based social engineering. When staff receive an email appearing to come from the superintendent requesting urgent action, the instinct to comply quickly overrides security awareness training. Board members, who are public figures with names and roles published on the district website, are frequently impersonated in emails to district administrators. The power dynamic between administration and staff creates pressure to respond quickly without questioning the legitimacy of requests.

Finally, the decentralized IT support structure of most districts means that individual buildings often have limited local technical expertise. When a teacher receives a suspicious email, their first instinct may be to click the link to see what it is rather than to report it, especially if the reporting process is unclear or perceived as cumbersome.

02

Common K-12 Phishing Scenarios

Understanding the specific phishing scenarios that target schools is essential for effective staff training. The following scenarios are based on real attacks observed across K-12 districts and represent the most common lure types.

The fake Google Workspace or Microsoft 365 password reset is the highest-volume K-12 phishing lure. The email appears to come from the district IT department, often spoofing or closely mimicking the real IT director's email address. It warns that the user's password will expire and directs them to a convincing replica of the Google or Microsoft sign-in page. Variations include fake shared document notifications and storage quota warnings. These are effective because districts legitimately send frequent IT notifications and staff are conditioned to respond to them.

Superintendent impersonation BEC targets district business office staff and building principals. The attacker spoofs the superintendent's display name (or uses a lookalike domain) and sends an urgent request, typically to process a wire transfer, purchase gift cards for a staff appreciation event, or redirect a vendor payment. These emails are often sent late in the day or on Fridays when rushed decision-making is more likely. The requests are crafted to appear plausible based on publicly available information about district operations.

Fake vendor invoices target accounts payable staff with invoices for common district purchases — copier supplies, software licenses, maintenance contracts — with updated bank routing information. During peak purchasing periods, the volume of legitimate invoices makes it difficult for staff to verify every payment change request individually.

The parent information request impersonates a parent or guardian and targets school office staff, counselors, or teachers. The email requests a child's schedule, bus route, emergency contact information, or health records, exploiting the customer-service orientation of school staff and their desire to be responsive to families.

03

How to Identify Phishing

Effective phishing identification relies on developing habits of verification rather than memorizing a static list of indicators. However, specific technical and contextual cues can significantly improve detection rates when staff know what to look for.

Sender address verification is the single most important check and should become automatic before any action is taken on an email. The display name (what appears in the From field) is trivially easy to spoof and provides no security value. Staff must click on or hover over the sender's name to reveal the actual email address. Common red flags include domain misspellings (gogle.com instead of google.com, dIstrict.org with a capital I instead of a lowercase L), public email services used for official-appearing communications (superintendent.name@gmail.com), and reply-to addresses that differ from the sender address.

The hover-before-click discipline requires staff to hover their cursor over every link before clicking to preview the actual destination URL. Phishing links often display a legitimate URL as the link text while the actual hyperlink points to a completely different domain. On mobile devices where hovering is not possible, staff should long-press links to preview the URL. Any URL that does not match the expected destination should be treated as suspicious.

Urgency and pressure tactics are hallmarks of social engineering. Phishing emails consistently create artificial time pressure: your account will be locked in 24 hours, this transfer must be completed today, respond immediately or lose access. Legitimate IT and administrative communications rarely demand immediate action with negative consequences for delay. Any email that creates a sense of urgency and requests clicking a link, opening an attachment, or providing information should be independently verified through a separate communication channel.

Grammar and formatting indicators have become less reliable as threat actors leverage AI to generate polished content. However, subtle inconsistencies remain useful: mismatched branding elements, unusual email formatting compared to genuine district communications, inconsistent greeting styles, and communications received at unusual hours. Training staff to notice when something simply feels different from typical district communications develops an intuitive detection capability that supplements technical verification steps.

04

Reporting Procedures

A clear, simple, and consistently reinforced reporting procedure is essential for converting phishing detection into organizational defense. The reporting process must be easier than the alternative of ignoring the email, or staff will not report consistently. Every second that a phishing email remains unreported is a second during which another staff member may click on it.

The primary reporting method should be a one-click mechanism integrated into the email client. For Google Workspace, this is the built-in Report Phishing option or a custom add-on that forwards the email to the security team with full headers intact. For Microsoft 365, the Report Message add-in provides the same functionality. One-click reporting captures the complete email including headers, attachments, and metadata needed for technical analysis. Staff should never forward suspicious emails to IT using the standard forward function, as this strips important header information and may trigger malicious content in the forwarded message.

When one-click reporting is not available (for example, when staff are accessing email on a device without the add-on), the secondary procedure should be to contact the IT help desk via phone at a known, published number. Staff should not reply to the suspicious email, should not click any links within it, and should not forward it. Instead, they should leave the email in their inbox and call the help desk with the subject line, sender information, and a brief description.

IT team response SLA should be communicated to all staff: acknowledged within 30 minutes during business hours, analyzed within two hours, and if confirmed malicious, organization-wide block implemented within four hours. Communicating this SLA demonstrates that reports are taken seriously and acted upon, which reinforces reporting behavior. When a reported phishing email is confirmed malicious, send a brief notification to all staff describing the threat and thanking the reporter by name (with their permission) — this positive reinforcement is one of the most effective tools for building a reporting culture.

05

Quick-Reference Card Content

The quick-reference card is designed to be printed as a wallet-sized card or posted near workstations as an immediate-access resource. The content is intentionally concise — staff need to internalize five simple questions and a single reporting action, not a comprehensive security manual.

The front of the card presents the Five Questions to Ask Before Clicking, designed to be evaluated in sequence. If any question raises a concern, the staff member should report the email rather than interact with it.

  • WHO sent this? Click the sender name to check the actual email address — does the domain match the claimed organization exactly?
  • WHY am I receiving this? Was I expecting this message, attachment, or request? If it is unexpected, verify through a separate channel.
  • WHAT is it asking me to do? Am I being asked to click a link, open an attachment, provide information, or authorize a financial transaction?
  • WHEN does it say I must act? Is artificial urgency being created? Legitimate requests rarely demand immediate action with negative consequences.
  • WHERE does the link actually go? Hover over any link to preview the destination URL — does it match the expected domain exactly?
06

Training Program Structure

An effective K-12 phishing awareness program requires a structured, multi-layered approach that goes beyond annual compliance presentations. Research consistently demonstrates that one-time training produces a brief improvement in detection rates that decays within 90 days. Sustained behavioral change requires regular reinforcement and experiential learning.

Annual mandatory training establishes the baseline. All staff — including administrators, teachers, paraprofessionals, office staff, custodial staff, and bus drivers — must complete a comprehensive phishing awareness module at the beginning of each school year. This training covers the current threat landscape, K-12-specific scenarios, the district's reporting procedure, and the consequences of successful phishing attacks. The training should include interactive elements such as identifying phishing in sample emails, not just passive video viewing. Completion must be tracked and verified at 100% staff participation.

Monthly micro-lessons keep phishing awareness current throughout the year. These are brief (three to five minute) modules delivered via email or the district's learning management system. Each micro-lesson focuses on a single topic: a specific phishing technique, a recent real-world K-12 phishing incident, a seasonal threat alert, or a review of the reporting procedure. The brevity and focus of micro-lessons makes them more likely to be completed and retained than lengthy annual refresher courses.

Simulated phishing campaigns provide the experiential learning that transforms knowledge into behavior. The district should conduct monthly simulated phishing exercises using templates that mirror real K-12 threats. Staff who click on simulated phishing emails should receive immediate, private, non-punitive feedback explaining the indicators they missed and reinforcing the correct response. Track click rates, report rates, and time-to-report as key metrics. Successful programs typically see click rates decrease from 20-30% to under 5% within 12 months, with reporting rates increasing from under 10% to over 50%.

07

Technical Controls with iboss

Staff training is an essential component of phishing defense, but it cannot be the sole control. Even well-trained staff will occasionally click on a phishing link — the goal of technical controls is to ensure that a click does not result in a compromise. iboss provides multiple technical layers that complement and backstop human awareness.

iboss email threat protection integrates with Google Workspace and Microsoft 365 to analyze inbound email for phishing indicators before delivery to staff inboxes. This includes sender reputation analysis, domain spoofing detection (SPF, DKIM, DMARC validation), attachment sandboxing, and URL reputation scanning for links embedded in email bodies. Emails that fail these checks are quarantined for IT review rather than delivered with a warning banner, reducing the decision burden on staff.

Real-time URL analysis at click time is a critical defense layer that protects against phishing links that were clean at delivery time but were weaponized after the email passed initial scanning — a technique known as delayed detonation. When a user clicks a link in an email, iboss re-evaluates the URL in real time against current threat intelligence. If the URL has been identified as malicious since the email was delivered, iboss blocks access and displays a warning page. This time-of-click protection catches phishing campaigns that deliberately delay the activation of their credential harvesting pages.

iboss Remote Browser Isolation provides the ultimate safety net for users who click suspicious links. When browser isolation is applied to URLs from email messages, the phishing page is rendered in a secure cloud container and streamed as pixels to the user's browser. Even if the page contains a convincing credential harvesting form, credential theft prevention policies can block the submission of corporate credentials to unauthorized domains. Combined, these technical controls reduce the effective phishing success rate to near zero when properly configured, while allowing the organization to move away from a blame-based security culture and toward a defense-in-depth model that does not depend on every user making the right decision every time.

← All Resources
16 pages · Guide

Need help implementing this?

Calbrate configures iboss to meet every requirement covered in this resource. Free assessment included.

Free · No obligation · Response within 24 hours