3 min read
Cyber Risks: On-Premise vs. Cloud-Based Software
Schools are reliant on technology to manage educational resources, student information, and administrative functions. With this dependency comes the...
Explore technology and privacy solutions designed to protect and improve your operations.
Master the tools and knowledge to effectively manage risks and empower your team.
Discover the full range of solutions we offer to safeguard and optimise your business
Ensure robust protection and compliance with our comprehensive security testing and assessments.
Enhance your team's capabilities with our training programs and professional development services.
Our team provides specialized services tailored to meet your unique cybersecurity and compliance needs.
Streamline governance, privacy and vendor management and ensure compliance with our powerful 9ine Platform.
Access the Application Library designed to take control of your EdTech ecosystem. Improve your vendor vetting processes.
Learn about the 9ine platform’s comprehensive capabilities in governance, risk management, and compliance.
Serving the unique needs of UK State, Independent, and Multi-Academy Trusts (MATs).
Providing innovative solutions for independent and international schools across the globe.
Explore partnership opportunities and career paths within our dynamic team.
Join our trusted network of certified vendors and expand your business opportunities.
3 min read
Schools are reliant on technology to manage educational resources, student information, and administrative functions. With this dependency comes the...
3 min read
With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...
1 min read
In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...
2 min read
In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead...
5 min read
Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...
5 min read
A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...
5 min read
Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...
5 min read
Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...
4 min read
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
4 min read
In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...
2 min read
To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...
3 min read
Cyber Security Guidance from the Charity Commission
3 min read
In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...
7 min read
In this fourth blog in the series, we look at Malware Prevention, following the guidance from the UK National Cyber Security Centre (NCSC). We...