Security6 min readMay 5, 2026

How to Report a Suspicious Device or Login at Your School

Why Strange Devices and Mystery Logins Are More Dangerous Than Ever

Think about your school for a moment — hundreds of students logging in on their phones, teachers connecting laptops from home, administrators accessing data from the office and remotely. It's like managing a small city's worth of digital activity, and that creates unique security challenges that most businesses never face.

The stakes have never been higher. According to SpyCloud's 2025 Identity Exposure Report, there were 17.3 billion stolen session cookies circulating the dark web in 2024. These cookies act like digital "hall passes" — they let attackers impersonate legitimate users without needing passwords, security codes, or any of the usual protections.

Here's what makes this particularly dangerous for schools: when an attacker compromises one device or login, they often use it as a stepping stone to access your entire network. That mystery device showing up in your Google Admin console might be a student's hacked phone, but it could give cybercriminals access to grade systems, student records, or financial data.

The key difference? A suspicious device is an unknown computer, phone, or tablet trying to connect to your systems. A suspicious login is someone (or something) trying to access accounts from unusual locations or at odd times. Both can signal that your school's security has been compromised, but catching them early — within hours, not days — can mean the difference between a close call and a devastating data breach that makes headlines.

Spotting the Red Flags: What Counts as Suspicious

Think of suspicious activity like watching for intruders in your school or office building — you know what belongs and what doesn't. The same principle applies to your digital systems, where unusual patterns often signal someone trying to break in.

The most obvious red flag is unknown devices appearing in your network or admin panels. Maybe you're used to seeing 50 student laptops on the network, but suddenly there are 53 — and three have strange names like "HACKER123" or random strings of letters and numbers. That's your cue to investigate.

Watch for login attempts from weird locations or times too. If your system shows someone logging in from Russia at 3 AM, but that teacher was home asleep in California, you've got a problem. Pay special attention to multiple failed login attempts followed by a successful one — that's often someone trying to guess passwords until they get lucky.

One of the biggest warning signs is when staff say they didn't log in when your system shows they did. With 17.3 billion stolen session cookies circulating the dark web in 2024, attackers can impersonate legitimate users without needing their actual passwords. A middle school in Oregon caught this exact scenario when their librarian insisted she wasn't accessing student records at midnight — and she was right.

Your Step-by-Step Response When Something Looks Wrong

When you spot a device you don't recognize or notice someone logged in who shouldn't be, your first instinct might be to shut everything down. But hold on — that suspicious device could contain evidence that helps track down what happened.

Start by taking screenshots of everything you see: the device name, login location, and timestamps. Think of it like photographing a crime scene before the police arrive. Then immediately change passwords for any accounts that might be compromised. Most services also have a "Sign Out of All Devices" button — use it. This kicks out anyone who might be lurking in your accounts.

The threat is more serious than you might think. According to SpyCloud's 2025 research, there were 17.3 billion stolen session cookies circulating the dark web in 2024, allowing attackers to impersonate legitimate users without needing passwords or even multi-factor authentication.

Next, contact your IT support team or managed service provider immediately. They can help determine if this is a serious breach or just a family member who borrowed someone's laptop. Save law enforcement for cases involving stolen money, threats, or clear criminal activity. For most suspicious logins, your IT team can handle the investigation and cleanup.

Who to Call and What Information They Need

When you spot something suspicious, knowing who to call and what information to gather can make the difference between containing a threat quickly and watching it spread throughout your network.

Start with your immediate team. Contact your IT staff first — they can assess whether this is a false alarm or something more serious. If you don't have dedicated IT staff, call your principal or district office immediately. Don't wait until tomorrow morning or after the weekend. Cybercriminals don't take breaks.

For serious incidents — like suspected data breaches, ransomware, or evidence that hackers are actively in your systems — you may need to contact external authorities. CISA (the Cybersecurity and Infrastructure Security Agency) offers free incident reporting and can provide guidance. The FBI handles cybercrime investigations, and local law enforcement should be notified if you suspect criminal activity.

Before making any calls, gather key details: the suspicious device's location, any error messages you saw, which accounts or systems might be affected, and timestamps of when you first noticed problems. Take screenshots if possible. This information helps responders understand the scope and urgency of the situation.

With 17.3 billion stolen session cookies circulating the dark web in 2024, attackers can now bypass traditional security measures entirely. Having this documentation ready helps your IT team or managed service provider respond faster and more effectively to protect your organization.

Building Your School's Early Warning System

Think of your school's security like a neighborhood watch program — it only works when everyone knows what to look for and who to call. The most effective schools create simple systems that any staff member can follow, whether they're tech-savvy or barely know how to check email.

Start with a one-page incident response plan that fits on a laminated card. Include steps like "Save what you're doing, don't click anything else, and call this number." Train teachers to spot the obvious red flags — unexpected login notifications, computers running slower than usual, or programs they didn't install. The goal isn't to make everyone an IT expert, but to create your early warning system.

Professional monitoring tools catch the sophisticated stuff that human eyes miss. With 17.3 billion stolen session cookies circulating the dark web in 2024, attackers can now impersonate legitimate users without needing passwords or even bypassing your multi-factor authentication. These threats move too fast and hide too well for manual detection.

The reality is that most schools need both — trained staff as the first line of defense and professional IT support as the safety net. A comprehensive technology assessment helps identify the gaps in your current setup before they become expensive problems. If you're ready to build a security system that actually protects your school, get a free assessment to see where you stand and what steps make the most sense for your specific situation.

Get new insights in your inbox

Practical IT and security tips — about 3x per week. No spam. Unsubscribe anytime.