Skip to the main content.
Technology & Privacy Solutions

Explore technology and privacy solutions designed to protect and improve your operations.

Strategic Risk Management & Training

Master the tools and knowledge to effectively manage risks and empower your team.

Solutions Overview

Discover the full range of solutions we offer to safeguard and optimise your business

Discover solutions

innovation-inspiration
Cyber Security & Cloud Assessments

Ensure robust protection and compliance with our comprehensive security testing and assessments.

Specialised Training & Expertise

Enhance your team's capabilities with our training programs and professional development services.

Expert Professional Services

Our team provides specialized services tailored to meet your unique cybersecurity and compliance needs.

man-working-laptop-with-icons-social-networking-screen

 

9ine Platform Solutions

Streamline governance, privacy and vendor management and ensure compliance with our powerful 9ine Platform.

Application Library

Access the Application Library designed to take control of your EdTech ecosystem. Improve your vendor vetting processes.

Learn more

Application Library-3

 

9ine Platform Overview

Learn about the 9ine platform’s comprehensive capabilities in governance, risk management, and compliance. 

Discover 9ine Platform

Product - 9ine Platform
Tailored Solutions for UK Schools

Serving the unique needs of UK State, Independent, and Multi-Academy Trusts (MATs).

Global School Solutions

Providing innovative solutions for independent and international schools across the globe.

 

Collaborate & Grow with us

Explore partnership opportunities and career paths within our dynamic team.

Certified Vendor Programme

Join our trusted network of certified vendors and expand your business opportunities.

Learn more

Vendor Certificate - ECIS - Image

 

About us

Learn more about our mission, vision, and the values that drive our work.

Discover 9ine

business-people-office

 

Cyber Risks: On-Premise vs. Cloud-Based Software
7:17

Schools are reliant on technology to manage educational resources, student information, and administrative functions. With this dependency comes the critical need for robust cyber security measures. The type of infrastructure a school uses—on-premises servers or cloud-based solutions—presents different sets of cyber risks. Understanding these risks is essential for developing effective security strategies. This article will explore the distinct cyber risks associated with on-premises servers and cloud-first schools and how 9ine can help mitigate these threats.

Cyber Risks of On-Premises Servers

 

1. Physical Security Threats:

On-premises servers are susceptible to physical security threats, including theft, vandalism, natural disasters and compromise through physical access. There have been many examples where poor physical security has led to cyber compromise via keyloggers, direct console access to network systems or access via server systems designed for resilience. Physical security of a school's systems architecture should be risk assessed to the same standard as virtual access. 

2. Maintenance and Updates:

Managing on-premises servers requires regular maintenance and timely updates to safeguard against vulnerabilities. Failure to apply patches and updates can leave systems exposed to cyber-attacks. Schools often struggle with the resources and expertise needed to keep up with these demands. Policies should be in place which require processes and procedures to identify  and implement software / firmware updates following a risk based approach. A risk based approach considers the criticality of the update against the operational impact of taking off line systems while being updated. Generally speaking schools should allow a window of time each week for these types of updates.

3. Internal Threats:

Insider threats pose a significant risk to on-premises servers. Staff or students with malicious intent can exploit their access to cause harm. Implementing strict access controls and monitoring user activity is essential but can be resource-intensive. These types of threats are increased in BYOD environments where access and utilisation of device resources are not centrally managed by the tech department. In these cases there is potential for these device resources to be exploited by malware, or an inquisitive user, to elevate privileges and laterally move through the systems architecture. Limiting this threat is primarily based on following a zero trust approach in network and systems configuration.

4. Limited Scalability:

On-premises servers may face scalability issues. As the school’s data and processing needs grow, upgrading hardware can be costly and time-consuming. This limitation can lead to performance bottlenecks and increased vulnerability as outdated systems are more susceptible to attacks. The more systems a school has on-premises also makes it more difficult to restore data and access should a cyber attack or system failure occur. There is a greater dependence on disaster recovery planning and having up-to-date documentation (and backups) to rebuild should the worse happen.

Cyber Risks of Cloud-First Schools

 

1. Data Breaches

Cloud environments are prime targets for cybercriminals due to the vast amount of data they host. Data breaches can occur if there are weaknesses in the cloud provider’s security or if school staff misconfigure security settings. There is growing evidence that data in these systems isn’t often protected as well as data on-premise. Quite often these weaknesses relate to poor user account management, access controls and password security.

2. Dependency on Service Providers:

Schools using cloud services are dependent on the security measures of their providers. A breach or failure on the provider’s end can compromise the school’s data. It’s crucial for schools to choose reputable providers with strong security track records. The primary way to do this is to ensure each service provider’s contract is sufficiently evaluated for compliance with legal requirements and industry standards. There are a number of well known examples where a large EdTech vendor has had a cyber breach, but where schools are not legally protected or indemnified as the contracts that have been agreed to, have missed critical clauses.

3. Access Management:

Cloud-based systems require robust access management protocols. Poor access controls or insufficient staff training can lead to unauthorised access and data leaks. Regular audits and staff education are vital to maintaining security. These protocols need to be applied at a domain, authentication and platform level that requires coordination between the school’s tech team and the system owner. 

4. Network Security:

Using cloud services increases the attack surface, as data is transmitted over the internet. Schools must ensure secure connections and use encryption to protect data in transit. Additionally, DDoS attacks can disrupt access to cloud services, affecting school operations.

Balancing Security Measures

Both on-premises and cloud-first schools face unique cyber risks. To mitigate these threats, schools must adopt a comprehensive approach to cyber security:

  • Conduct Regular Assessments: Regular vulnerability assessments and penetration testing help identify and address potential weaknesses.
  • Implement Strong Access Controls: Use multi-factor authentication, role-based access controls, and regular audits to manage access to sensitive information.
  • Invest in Staff Training: Educate staff and students about cyber security best practices to reduce the risk of human error.
  • Maintain Backup and Recovery Plans: Ensure regular data backups and develop a robust disaster recovery plan to minimise downtime and data loss in case of an attack.

How 9ine Can Help

Navigating the complex landscape of cyber security can be daunting for schools. 9ine offers a range of services tailored to the unique needs of educational institutions. Our cyber security testing services encompass both on-premises and cloud environments, providing comprehensive assessments to identify and mitigate risks. Additionally, 9ine’s privacy, risk, and Edtech impact services ensure that schools are not only secure but also compliant with relevant regulations.

Our team of experts can assist with developing and implementing effective security strategies, conducting regular vulnerability assessments, and providing ongoing support and training. By partnering with 9ine, schools can focus on their primary mission—educating students—while we handle the complexities of cyber security.

In conclusion, whether your school relies on on-premises servers or adopts a cloud-first approach, understanding and addressing the unique cyber risks associated with each setup is crucial. With the right strategies and expert support from 9ine, schools can create a secure digital environment for their students and staff.

Cyber Security in Schools: Event Log Monitoring

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...

Read More
What are the types of Cyber Attacks that could impact my School?

What are the types of Cyber Attacks that could impact my School?

Cybercriminals have increasingly shifted their attention to the education sector. As per Microsoft's report of global cyber threat activity, the...

Read More
2020 School Predictions: Data Protection & Cyber Security

2020 School Predictions: Data Protection & Cyber Security

Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...

Read More