Most schools today run either Google Workspace for Education or Microsoft 365 for email, collaboration, and identity. Unfortunately, attackers know this too, and they target school accounts with phishing, password spraying, and credential theft.
The good news is you don’t need to buy premium licenses to improve security. Both platforms include free settings that can significantly reduce risk if you enable them.
Here are 5 to prioritize in every school environment.
1. Require Multi-Factor Authentication (MFA)
Why it matters:
Passwords alone aren’t enough. MFA stops most account takeover attempts cold.
Microsoft 365 / Entra:
- Go to Entra Admin Center → Security → Conditional Access.
- Enforce MFA for admins first, then expand to all staff.
- Students can be handled differently depending on age/policy.
Google Workspace:
- Admin Console → Security → Authentication → 2-Step Verification.
- Enforce for staff and administrators.
- Use security keys or mobile apps for stronger protection.
Impact: Even if a password is stolen, attackers can’t log in without the second factor.
2. Block Legacy Authentication
Why it matters:
Older protocols (POP, IMAP, SMTP) don’t support MFA and are favorite targets for password-spray attacks.
Microsoft 365:
- Entra Admin Center → Security → Conditional Access.
- Block legacy protocols.
- Run a report first to identify accounts still using them: Legacy Authentication
Google Workspace:
- Admin Console → Security → Less Secure Apps → Disable.
Impact: Reduces one of the most common ways attackers break in.
3. Turn Off Auto-Forwarding
Why it matters:
Attackers often set up auto-forwarding rules after compromising accounts, silently exfiltrating all email.
Microsoft 365:
- Exchange Admin Center → Mail Flow → Remote Domains → Disable auto-forwarding.
Google Workspace:
- Admin Console → Apps → Gmail → User Settings → Disable automatic forwarding.
Impact: Stops attackers from siphoning data unnoticed. Be sure to exclude any accounts that may need automatic forwarding enabled.
4. Enable Admin Alerts
Why it matters:
You can’t fix what you don’t know about. Both Microsoft and Google can send alerts when suspicious activity occurs.
Microsoft 365:
- Entra Admin Center → ID Protection → Dashboard → Users at risk detected alerts.
- Examples: unusual admin role changes and high volume of failed logins.
Google Workspace:
- Admin Console → Rules → Activity Rules → Enable predefined templates (suspicious login, admin role change).
Impact: Gives IT visibility into critical security events.
5. Enforce Strong Password Policies
Why it matters:
Weak passwords remain one of the easiest ways into school systems.
Microsoft 365 / Entra:
- Use fine-grained password policies for staff/admins.
- Example: Staff = 8 chars minimum; Admins = 12 chars + MFA required.
Google Workspace:
- Admin Console → Security → Password Management.
- Set minimum length and complexity.
Impact: Makes brute force attacks much less effective.
Closing Thoughts
Schools don’t always have a budget for expensive security platforms, but that doesn’t mean they’re defenseless. You can dramatically improve your security posture by enabling free, built-in settings in Microsoft 365 and Google Workspace at no additional cost.
Start with MFA, block legacy protocols, disable auto-forwarding, enable alerts, and enforce strong password rules. These steps alone stop many of the most common attacks schools face every day.
Comments
Post a Comment