2 min read
The Current Cyber Threats to Schools
Cyberthreats are becoming an increasingly pressing issue for schools as more and more educational institutions rely on technology to provide students...
2 min read
Cyberthreats are becoming an increasingly pressing issue for schools as more and more educational institutions rely on technology to provide students...
2 min read
Supply chain attacks are a growing concern for schools, as they can have a significant impact on the operations and security of the institution. A...
5 min read
With the joys of Brexit behind us the government is preparing to legislate on changes to the UK-GDPR. Their view, the EU-GDPR is too onerous and...
2 min read
KCSIE has been updated in readiness for schools to digest and ensure they can evidence compliance from September 2022. There are a number of subtle...
3 min read
The spiritual successor to Vine, the short form video creation app TikTok has skyrocketed in popularity in recent years. Arguably most popular with...
1 min read
The management of risk is a requirement of the Academy Trust Handbook. Academy trusts must manage risks to ensure their effective operation,...
3 min read
With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...
1 min read
In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...
2 min read
In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead...
5 min read
A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...
5 min read
Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...
5 min read
Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...
4 min read
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
4 min read
In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...