Skip to the main content.

9ine Insights

Discover the latest on AI, data protection, and cyber security.

Risk Management (2)

1 min read

Complying with Risk Obligations in the Academy Trust Handbook 

The management of risk is a requirement of the Academy Trust Handbook. Academy trusts must manage risks to ensure their effective operation,...

Read More

3 min read

[COVID-19] FAQs: Remote Conferencing, Learning & Data Protection

With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...

Read More

1 min read

[COVID-19 UPDATE]  Assessing and Deploying New Software Platforms

In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...

Read More

2 min read

[COVID-19] Guidelines: Remote Working & Data Sharing Protection

In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead...

Read More
Stack of CDs

5 min read

Cyber Security in Schools: Removable Media, Data Loss and Malware

Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...

Read More

5 min read

How to Plan for a Data Breach in Your School Network

A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...

Read More

5 min read

2020 School Predictions: Data Protection & Cyber Security

Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...

Read More

5 min read

Cyber Security in Schools: Home and Mobile Working

Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...

Read More
9ine_Blog_Social_Event_Log_Monitoring-(1)

4 min read

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...

Read More

4 min read

Cyber Security in Schools: Passwords & Human Firewall

In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...

Read More
Coins on a table.

2 min read

Cyber Compliance Requirements - Academies Financial Handbook 2019

To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...

Read More
A hacker using a laptop

3 min read

Cyber Crime & Fraud - What Your Governing Body Needs to Know

Cyber Security Guidance from the Charity Commission

Read More
Stepping Stones

3 min read

Cyber Security: Incident Management for School Continuity

In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...

Read More