Skip to the main content.
Technology & Privacy Solutions

Explore technology and privacy solutions designed to protect and improve your operations.

Strategic Risk Management & Training

Master the tools and knowledge to effectively manage risks and empower your team.

Solutions Overview

Discover the full range of solutions we offer to safeguard and optimise your business

Discover solutions

innovation-inspiration
Cyber Security & Cloud Assessments

Ensure robust protection and compliance with our comprehensive security testing and assessments.

Specialised Training & Expertise

Enhance your team's capabilities with our training programs and professional development services.

Expert Professional Services

Our team provides specialized services tailored to meet your unique cybersecurity and compliance needs.

man-working-laptop-with-icons-social-networking-screen

 

9ine Platform Solutions

Streamline governance, privacy and vendor management and ensure compliance with our powerful 9ine Platform.

Application Library

Access the Application Library designed to take control of your EdTech ecosystem. Improve your vendor vetting processes.

Learn more

Application Library-3

 

9ine Platform Overview

Learn about the 9ine platform’s comprehensive capabilities in governance, risk management, and compliance. 

Discover 9ine Platform

Product - 9ine Platform
Tailored Solutions for UK Schools

Serving the unique needs of UK State, Independent, and Multi-Academy Trusts (MATs).

Global School Solutions

Providing innovative solutions for independent and international schools across the globe.

 

Collaborate & Grow with us

Explore partnership opportunities and career paths within our dynamic team.

Certified Vendor Programme

Join our trusted network of certified vendors and expand your business opportunities.

Learn more

Vendor Certificate - ECIS - Image

 

About us

Learn more about our mission, vision, and the values that drive our work.

Discover 9ine

business-people-office

 

9ine Insights

Discover what is going on in the world of data protection and cybersecurity.

Backup

Cyber-security-system-risk-cloud-onsite

3 min read

Cyber Risks: On-Premise vs. Cloud-Based Software

Schools are reliant on technology to manage educational resources, student information, and administrative functions. With this dependency comes the...

Read More

3 min read

[COVID-19] FAQs: Remote Conferencing, Learning & Data Protection

With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...

Read More

1 min read

[COVID-19 UPDATE]  Assessing and Deploying New Software Platforms

In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...

Read More

2 min read

[COVID-19] Guidelines: Remote Working & Data Sharing Protection

In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead...

Read More
Stack of CDs

5 min read

Cyber Security in Schools: Removable Media, Data Loss and Malware

Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...

Read More

5 min read

How to Plan for a Data Breach in Your School Network

A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...

Read More

5 min read

2020 School Predictions: Data Protection & Cyber Security

Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...

Read More

5 min read

Cyber Security in Schools: Home and Mobile Working

Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...

Read More
9ine_Blog_Social_Event_Log_Monitoring-(1)

4 min read

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...

Read More

4 min read

Cyber Security in Schools: Passwords & Human Firewall

In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...

Read More
Coins on a table.

2 min read

Cyber Compliance Requirements - Academies Financial Handbook 2019

To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...

Read More
Stepping Stones

3 min read

Cyber Security: Incident Management for School Continuity

In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More
Castle with a moat

7 min read

Malware Prevention: Establishing & Maintaining Defenses

In this fourth blog in the series, we look at Malware Prevention, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More