1 min read
Complying with Risk Obligations in the Academy Trust Handbook
The management of risk is a requirement of the Academy Trust Handbook. Academy trusts must manage risks to ensure their effective operation,...
1 min read
The management of risk is a requirement of the Academy Trust Handbook. Academy trusts must manage risks to ensure their effective operation,...
3 min read
With the rush to implement video platforms that profess to offer safe and secure remote learning, we have compiled a list of frequently asked...
1 min read
In our previous blog, "Data Protection Guidelines for Remote Working and Data Sharing," we published some simple steps to help you identify the risks...
2 min read
In the current climate, it is important that schools do not use data protection regulations to discourage remote working or data sharing, but instead...
5 min read
Over the last two years, we have spent hundreds of hours working with individuals and departments mapping data processes in line with data protection...
5 min read
A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident...
5 min read
Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools...
5 min read
Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school...
4 min read
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
4 min read
In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...
2 min read
To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...
3 min read
Cyber Security Guidance from the Charity Commission
3 min read
In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...