All News

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 29. Admin Controls & Accounts

Administrator accounts (often called "privileged accounts") are the most powerful and, so, the most sought-after targets for cybercriminals. These accounts hold the "keys to the kingdom," possessing extensive permissions to configure systems, access sensitive data, manage users, and make critical changes across an entire network or application. A single compromised admin account can lead to a catastrophic data breach, widespread system paralysis, or complete organisational takeover by attacke

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 28. Phishing: Don't Take the Bait!

Phishing remains one of the most prevalent and effective cyberattack methods, tricking millions into compromising their data every year. These deceptive messages, often arriving via email, text message (smishing), or phone call (vishing), are designed to look legitimate. They aim to trick you into revealing sensitive information like login credentials, credit card numbers, or personal data, or to click on malicious links that install malware.  They may also be the start of a more complex

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 27. Passwords

Your password is your first, and often most critical, line of defence. Yet, far too many people still rely on easily guessable combinations like "123456" or "password," leaving their digital lives wide open to attack. Cybercriminals use sophisticated tools to crack weak passwords in seconds, and is one of the easiest forms of attack - low risk.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 26. Physical Security of Digital Assets

It's easy to overlook the importance of physical security when we rely so heavily on digital systems, but it's a critical component of overall cyber security. This means protecting your devices and data from unauthorised physical access. For individuals, it's locking your laptop when you step away, securing your home network equipment, and shredding sensitive documents. For organisations, it includes controlled access to offices and server rooms, securing hardware (laptops, USB drives), and m

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 25. Server Security: Protecting Your Digital Core

For most organisations, servers are the undisputed backbone of their IT infrastructure. They house critical applications, store vast amounts of sensitive data (customer information, intellectual property, financial records), and power essential services. Consequently, servers are prime targets for cyber attackers, making robust server security an absolute necessity, not an option. A compromise of even one critical server can bring an entire operation to its knees.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 23. Filtering and Monitoring

In cybersecurity, filtering and monitoring are proactive measures that act as your digital watchdogs, guarding against threats by controlling what comes in and out of your networks and systems, and by continuously observing activity for suspicious signs. These practices are essential for early threat detection and prevention.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 22. Hardware: Printers

Printers are often overlooked, however, they can represent significant security vulnerabilities if not properly secured.  Modern printers are essentially specialised computers with network connections, storage capabilities, and their own operating systems, making them potential targets for cybercriminals.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 21. Hardware: Asset Management

In any organisation, and even for individuals with multiple devices, simply knowing what hardware and software you own is the foundational step for effective cybersecurity. This practice is known as asset management, and it's far more than just an inventory list; it's a critical component of risk management and security posture. You cannot protect what you do not know you have, or what state it's in.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 20. Hardware: Safe disposal

When upgrading your tech or getting rid of old devices, simply deleting files or formatting a hard drive is often not enough to truly erase your data. Safe disposal of hardware is a critical, yet frequently overlooked, aspect of cybersecurity. If sensitive personal or organisational information remains recoverable on old devices, it can easily fall into the wrong hands, leading to identity theft, financial fraud, or severe data breaches.

Read more …

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 19. Anti-virus/anti-malware

Anti-virus and anti-malware are essential tools that are designed to detect, prevent, and remove malicious software – collectively known as malware – that can infect your devices, compromise your data, and disrupt your operations. Just like your body needs an immune system to fight off infections, your digital devices need protection against cyber threats.

Read more …

  1. October 18. Regular Updates: Patching Against Threats
  2. October 17. Access Control: Managing User Privileges
  3. October 16. Access Control: Securing Your Digital Gateways (Wi-Fi & Networks)
  4. October 15. Access Control: Securing Your Home Office (Working From Home)
  5. October 14. Access Control : (Multi-factor authentication)
  6. October 13. Cyber Security Awareness
  7. October 12. Training: Empowering your human firewall
  8. October 11. Policies and Procedures: Cyber Blueprint
  9. October 10. Understanding Your Cyber Posture
  10. Time's Ticking: Windows 10 support ends in October 2025!
  11. October 9. A Guide for Education Providers
  12. October 8. How Can Your Organisation Prevent Ransomware Attacks?
  13. October 7: Under Attack: The Reality of Ransomware
  14. October 6: Cyber Action Plan and A Roadmap to Resilience
  15. October 5: Cyber Responsibilities - We're All in This Together
  16. October 4: When a Cyber Attack Hits
  17. October 3: Data Security, the Core of Protection
  18. October 2: Privacy Protection & Safeguarding Personal Data
  19. October 1: Welcome to Cyber Security Awareness Month!
  20. Nursery Cyber attack
  21. The NCSC Cyber Assessment Framework
  22. Fraud awareness from the DfE
  23. The Classroom's Dark Side: Cyber crime from the Classroom
  24. KCSIE 2025: Data Protection, AI, and Cyber Security
  25. New e-learning for 2025
  26. The Latest Cyber Threat: The "Murky Panda"
  27. Building a Secure School: Using the ICO Accountability Framework to Meet DfE Digital Standards
  28. Digital Safeguarding: DfE announces statutory DfE Digital Standards
  29. Compliance Reporting from the Knowledge Bank
  30. Social engineering + impersonation = Fraud ≡ cyber deception
  31. Data Breaches 2025 Report Highlights
  32. School cyber attack: Framlingham College, Suffolk
  33. Getting caught in the Scattered Spider web
  34. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  35. World Password Day
  36. Social Media and Marketing Guidelines and Training
  37. New Governor Resources
  38. Apple removes its highest level data security tool from UK customers
  39. Safer Internet Day, Cyber Security & Data Protection
  40. The Cyber Resilience Championship
  41. The Multiple Dimensions of Supplier Due Diligence
  42. Blacon High School Cyber Attack
  43. The role of Passkeys in Cyber Resilience and Cyber Security
  44. What the proposed Government legislative proposal around cyber crime means
  45. Effectively communicating during a cyber incident
  46. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  47. Cyber Security Best Practice Area
  48. DfE Digital Standards for Schools and Colleges Tracker
  49. New Policies, Documents, Letters and Posters page
  50. Schools and Trusts Best Practice Area
  51. The DPE Retention Schedule
  52. Making the Rounds Update (now includes reporting)
  53. How does the recent global IT outage affect me?
  54. King's speech introduces new bills in relation to cyber security, smart data and digital information
  55. Out of date technology
  56. What's a Cyber Incident and what should we do?
  57. Cyber attack on a school during half term
  58. Free short cyber training for staff
  59. The rise of cyber attacks in schools are causing pupils to miss classes
  60. ICO: Learning from the mistakes of others report
  61. Children's mental health data leaked after a cyber attack
  62. Cyber attack on a Trust; the aftermath
  63. Social Media Best Practice Area
  64. Lettings Best Practice Area
  65. MFA Bombing - What is it?
  66. Product Focus on Checklists : Initial Trust Plan
  67. Product Focus on Checklists : Information and Cyber Security
  68. Product Focus on Checklists : End of Term Checklist
  69. Product Focus on Checklists : Social Media
  70. Cyber Incident Review: The Benefits
  71. Product Focus on Checklists : Lettings
  72. Product Focus on Checklists : Record of Processing
  73. Why Data Should Stay Put: Benefits of Keeping Data in Its Original System
  74. Product Focus on Checklists : Data Retention and Destruction
  75. Product Focus on Checklists : Data Migration
  76. Product Focus on Checklists : Biometrics
  77. Product Focus on Checklists : Supplier Due Diligence
  78. Free Cyber help, advice and training with the Cyber Resilience Centres
  79. The Perils of Paper: The Printing Vulnerability
  80. Product Focus on Checklists : FOI
  81. Product Focus on Checklists : Governors and Data
  82. Product Focus on Checklists : DPIA
  83. Product Focus on Checklists : Site Moves
  84. Product Focus on Checklists : Data Breaches
  85. Product Focus on Checklists : Subject Access Requests
  86. Cyber attack on a University
  87. Product Focus on Checklists : Bring your own device
  88. Product Focus on Checklists : Working out of school/offsite
  89. Cyber Attack on a School
  90. Product Focus on Checklists : Redaction
  91. Product Focus on Checklists : CCTV
  92. Product Focus on Checklists : Clear desk
  93. Product Focus on Checklists : Commitment to compliance
  94. Product Focus on Checklists : Photos and video
  95. Product Focus on Checklists : Passwords
  96. Product Focus on Checklists : Information Classification
  97. Kent Councils Data Breach
  98. Free cyber training for staff
  99. DfE Digital Standards Update
  100. Where is your data stored?
  101. Phishing attacks targeting schools - alert from City of London Police
  102. The ICO reprimands a Multi Academy Trust
  103. CISA and UK NCSC Announce Joint Guidelines for Secure AI System Development
  104. Trust Initial Plan Checklist Update
  105. Update on Advisory for Rhysida Ransomware
  106. Records Management Best Practice Update
  107. The Crime in a Cyber Attack and a Data Breach
  108. NCSC Annual Review is published for 2023
  109. Learning from Data Breaches
  110. Windows 11 security ineffective against attacks on old devices
  111. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  112. International Counter Ransomware Initiative 2023 Joint Statement
  113. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  114. Top Ten Cyber Security Misconfigurations
  115. ICO Reprimand: company suffered a ransomware attack
  116. The UK Online Safety Bill becomes an Act (Law)
  117. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  118. Ransomware, extortion and the cyber crime ecosystem
  119. Cyber Resource: The Cyber Resilience Centre Group
  120. Email and Security: ICO recent guidance
  121. Help after a Cyber Attack/Incident
  122. What to do in the event of a Cyber Attack
  123. How KCSIE is linked to Cyber Strategy
  124. Cyber Crime: AI Generated Phishing Attacks
  125. Cyber Attack: Exam Boards
  126. VICE SOCIETY - Ransomware attacks on schools
  127. Using Tags if you are a group of organisations in the DPE Knowledge Bank
  128. Where's Harry the Hacker?
  129. Be Cyber Aware: USB Sticks
  130. Cyber Insurance in the Public Sector
  131. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  132. Cyber Attack: Leytonstone School
  133. Be Cyber Aware: Firewalls
  134. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  135. Cyber Attack: Dorchester School
  136. Knowledge Bank Role Types: Admin, Staff and Trustee
  137. Types of Cyber Attacks: Password Attacks
  138. Be Cyber Aware: Why regular software updates are important
  139. Cyber Attack: Wiltshire School
  140. Keeping your IT systems safe and secure
  141. Why we recommend using PIN codes on printers
  142. Types of Cyber Attacks: DDoS Attacks
  143. Types of Cyber Attacks: Phishing
  144. Redaction Guidelines Updated
  145. Types of Cyber Attacks: The Insider Threat
  146. Why your data is profitable to cyber criminals
  147. Using WhatsApp in Schools
  148. Knowledge Bank Updates
  149. Types of malware and how they are linked to data protection
  150. A guide to multi-factor authentication
  151. Windows Server 2012 & 2012 R2 Retirement
  152. How to contact us for support, subject access requests, data breaches and FOI's
  153. How a school fought back after a cyberattack
  154. Types of Cyber Attacks - Credential Stuffing
  155. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  156. Assigning courses to staff using to-dos
  157. The Education sector now at highest risk of cyber attacks
  158. Cyber Attacks
  159. Best Practice for Managing Photos and Video
  160. Compliance Manager released
  161. Emails – good practice and minimising the risk of a data breach

Search