Skip to the main content.

2 min read

[COVID-19] Guidelines: Remote Working & Data Sharing Protection

In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead sensibly evaluate the impact of these processing activities, taking into account the risks to the...

Read More
Stack of CDs

5 min read

Cyber Security in Schools: Removable Media, Data Loss and Malware

Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...

Read More

4 min read

Preparing for Remote Learning: A Readiness Worksheet

9ine are supporting schools around the world in the eventuality that they are required to provide school services remotely as a result of the...

Read More

2 min read

New Data Protection Agency Addressing US Privacy Crisis

Last week, US Senator Kirsten Gillibrand (D-NY) published a bill that, if passed, would create a US federal data protection agency designed to...

Read More

5 min read

How to Plan for a Data Breach in Your School Network

A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...

Read More

2 min read

FAQ: Impact of California Privacy Act 2018 on Schools Globally

Each month Heidi-Anne O'Neill, 9ine's in-house Data Protection Solicitor shares a frequently asked question to assist school leaders in solving...

Read More

5 min read

Cyber Security in Schools: Home and Mobile Working

Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...

Read More
9ine_Blog_Social_Event_Log_Monitoring-(1)

4 min read

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...

Read More

4 min read

Cyber Security in Schools: Passwords & Human Firewall

In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...

Read More
Stepping Stones

3 min read

Cyber Security: Incident Management for School Continuity

In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More
Clouds in the sky

3 min read

Security in the cloud: Office 365

Have you ever been asked, "how secure is our cloud platform?" or, "how can we minimise the risk of a data breach in our cloud apps?”

Read More
Castle with a moat

7 min read

Malware Prevention: Establishing & Maintaining Defenses

In this fourth blog in the series, we look at Malware Prevention, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More

4 min read

Data Protection & CIS International Accreditation Standards

KEY CHANGES WILL BE IMPLEMENTED THIS YEAR WITHIN CIS’ REVISED INTERNATIONAL ACCREDITATION PROTOCOL Over the past year there have been significant...

Read More
Laptop, book and mobile phone secured by chain

5 min read

User Awareness: Protecting Users & School Network

In this third blog in the series, we look at user awareness. We explore how schools can implement technical and organisational measures to protect...

Read More