2 min read
How to budget for cyber security
In the modern educational landscape, the importance of robust cyber security cannot be overstated. Schools are custodians of sensitive data, from...
Explore technology and privacy solutions designed to protect and improve your operations.
Master the tools and knowledge to effectively manage risks and empower your team.
Discover the full range of solutions we offer to safeguard and optimise your business
Ensure robust protection and compliance with our comprehensive security testing and assessments.
Enhance your team's capabilities with our training programs and professional development services.
Our team provides specialized services tailored to meet your unique cybersecurity and compliance needs.
Streamline governance, privacy and vendor management and ensure compliance with our powerful 9ine Platform.
Access the Application Library designed to take control of your EdTech ecosystem. Improve your vendor vetting processes.
Learn about the 9ine platform’s comprehensive capabilities in governance, risk management, and compliance.
Serving the unique needs of UK State, Independent, and Multi-Academy Trusts (MATs).
Providing innovative solutions for independent and international schools across the globe.
Explore partnership opportunities and career paths within our dynamic team.
Join our trusted network of certified vendors and expand your business opportunities.
2 min read
In the modern educational landscape, the importance of robust cyber security cannot be overstated. Schools are custodians of sensitive data, from...
2 min read
Exploring the impact of Artificial Intelligence in educational institutions and the considerations that need to be made when implementing AI...
3 min read
A comprehensive guide for technology leaders in schools, on how zero trust architectures can benefit the school’s cyber security practices, and what...
2 min read
In today's digital age, schools must prioritise online security to protect against cyber threats and safeguard sensitive data.
2 min read
The proliferation of free apps in the wake of the global pandemic created a wild west scenario, prompting schools to reconsider and regain control...
2 min read
Discover the new requirements set by Google and Yahoo for bulk senders and learn how to enhance your email security. Find out how these changes will...
3 min read
The Academy Financial Handbook has been updated and renamed as the Academy Trust Handbook. The requirements and guidance within the handbook has been...
5 min read
In this blog, we reveal some of the most common cyber threats to the education sector and explore questions such as who is committing cyber crimes,...
3 min read
With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...
1 min read
In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...
2 min read
It has been reported that a suspicious email is currently being sent to an education sector association. An attacker is contacting individuals and...
2 min read
School IT systems are like buildings. If you are constructing a building from the ground up you would develop plans, specifications, an operations...
5 min read
Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...
4 min read
9ine are supporting schools around the world in the eventuality that they are required to provide school services remotely as a result of the...
2 min read
Last week, US Senator Kirsten Gillibrand (D-NY) published a bill that, if passed, would create a US federal data protection agency designed to...
5 min read
A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...
5 min read
Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...
5 min read
Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...
4 min read
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
4 min read
In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...
2 min read
To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...
3 min read
Cyber Security Guidance from the Charity Commission
3 min read
In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...