Skip to the main content.

9ine Insights

Discover the latest on AI, data protection, and cyber security.

9ine_Blog_Social_Event_Log_Monitoring-(1)

4 min read

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our previous blog, User Privileges, Passwords and the Human Firewall, we outlined how good user management...

Read More

4 min read

Cyber Security in Schools: Passwords & Human Firewall

In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...

Read More
Coins on a table.

2 min read

Cyber Compliance Requirements - Academies Financial Handbook 2019

To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...

Read More
A hacker using a laptop

3 min read

Cyber Crime & Fraud - What Your Governing Body Needs to Know

Cyber Security Guidance from the Charity Commission

Read More
Stepping Stones

3 min read

Cyber Security: Incident Management for School Continuity

In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More
Clouds in the sky

3 min read

Security in the cloud: Office 365

Have you ever been asked, "how secure is our cloud platform?" or, "how can we minimise the risk of a data breach in our cloud apps?”

Read More
Castle with a moat

7 min read

Malware Prevention: Establishing & Maintaining Defenses

In this fourth blog in the series, we look at Malware Prevention, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More

4 min read

Data Protection & CIS International Accreditation Standards

KEY CHANGES WILL BE IMPLEMENTED THIS YEAR WITHIN CIS’ REVISED INTERNATIONAL ACCREDITATION PROTOCOL Over the past year there have been significant...

Read More
Laptop, book and mobile phone secured by chain

5 min read

User Awareness: Protecting Users & School Network

In this third blog in the series, we look at user awareness. We explore how schools can implement technical and organisational measures to protect...

Read More
Test tubes in a lab

4 min read

Cyber Security Research in Schools

Due to the success of 9ine’s data protection research at the start of the year and the cyber findings uncovered during the analysis, we are currently...

Read More
A safe door closed

4 min read

Network Security: Reducing Unauthorised Access & Data Protection

In this blog, the second in the series, we look at Network Security, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More
Brexit jigsaw, with the British piece removed

3 min read

BREXIT Data Transfer: No-Deal Action Required

Schools need to be prepared and ready for a no-deal Brexit The EDPB has just published adopted (12th February 2019) guidance on the requirements on...

Read More
A mallet about to smash an egg

3 min read

How to Assess Your School’s Vulnerability to Cyber Attacks

How is A Vulnerability Assessment achieved? In our last blog, “How secure is your school from Cyber attacks?” we outlined that schools need to move...

Read More
Keep calm and eat cake, cakes

5 min read

Breach Management in Schools - Keep calm and follow procedure

Do you know who holds your personal information? How reassured do you feel that your information is being managed in line with the General Data...

Read More