All News

AI generated image of a key hole overlayed by a finger print on a cyber background. Data protection education logo on the bottom right of the image

The role of Passkeys in Cyber Resilience and Cyber Security

🗝️🛡️ In a world where cyber attacks are becoming increasingly sophisticated, protecting sensitive information and user accounts has never been more critical. Traditional passwords are rapidly being replaced by a more advanced and secure solution: passkeys. This article explores the benefits of passkeys, their role in preventing cyber attacks, and what to do if a system does not yet support them.

Read more …

Knowledge Bank update in blue text. data protection education logo.  Orange and blue circles in the back ground.  A phone and laptop with the knowledge Bank best practice area.   Cyber security best practice in navy text on an orange circle

Cyber Security Best Practice Area

🛡️✅ Gone are the days when cyber security issues meant accidentally downloading a virus, it has grown to mean so much more, where data and identities are stolen, fraud is committed and businesses can be shut down from a cyber attack.  With that in mind we have created a cyber security best practice area to help guide and support your data protection compliance.

Read more …

  1. New Policies, Documents, Letters and Posters page
  2. Schools and Trusts Best Practice Area
  3. The DPE Retention Schedule
  4. Making the Rounds Update (now includes reporting)
  5. How does the recent global IT outage affect me?
  6. King's speech introduces new bills in relation to cyber security, smart data and digital information
  7. Out of date technology
  8. What's a Cyber Incident and what should we do?
  9. Cyber attack on a school during half term
  10. Free short cyber training for staff
  11. The rise of cyber attacks in schools are causing pupils to miss classes
  12. ICO: Learning from the mistakes of others report
  13. Children's mental health data leaked after a cyber attack
  14. Cyber attack on a Trust; the aftermath
  15. Social Media Best Practice Area
  16. Lettings Best Practice Area
  17. MFA Bombing - What is it?
  18. Product Focus on Checklists : Initial Trust Plan
  19. Product Focus on Checklists : Information and Cyber Security
  20. Product Focus on Checklists : End of Term Checklist
  21. Product Focus on Checklists : Social Media
  22. Cyber Incident Review: The Benefits
  23. Product Focus on Checklists : Lettings
  24. Product Focus on Checklists : Record of Processing
  25. Why Data Should Stay Put: Benefits of Keeping Data in Its Original System
  26. Product Focus on Checklists : Data Retention and Destruction
  27. Product Focus on Checklists : Data Migration
  28. Product Focus on Checklists : Biometrics
  29. Product Focus on Checklists : Supplier Due Diligence
  30. Free Cyber help, advice and training with the Cyber Resilience Centres
  31. The Perils of Paper: The Printing Vulnerability
  32. Product Focus on Checklists : FOI
  33. Product Focus on Checklists : Governors and Data
  34. Product Focus on Checklists : DPIA
  35. Product Focus on Checklists : Site Moves
  36. Product Focus on Checklists : Data Breaches
  37. Product Focus on Checklists : Subject Access Requests
  38. Cyber attack on a University
  39. Product Focus on Checklists : Bring your own device
  40. Product Focus on Checklists : Working out of school/offsite
  41. Cyber Attack on a School
  42. Product Focus on Checklists : Redaction
  43. Product Focus on Checklists : CCTV
  44. Product Focus on Checklists : Clear desk
  45. Product Focus on Checklists : Commitment to compliance
  46. Product Focus on Checklists : Photos and video
  47. Product Focus on Checklists : Passwords
  48. Product Focus on Checklists : Information Classification
  49. Kent Councils Data Breach
  50. Free cyber training for staff
  51. DfE Digital Standards Update
  52. Where is your data stored?
  53. Phishing attacks targeting schools - alert from City of London Police
  54. The ICO reprimands a Multi Academy Trust
  55. CISA and UK NCSC Announce Joint Guidelines for Secure AI System Development
  56. Trust Initial Plan Checklist Update
  57. Update on Advisory for Rhysida Ransomware
  58. Records Management Best Practice Update
  59. The Crime in a Cyber Attack and a Data Breach
  60. NCSC Annual Review is published for 2023
  61. Learning from Data Breaches
  62. Windows 11 security ineffective against attacks on old devices
  63. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  64. International Counter Ransomware Initiative 2023 Joint Statement
  65. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  66. Top Ten Cyber Security Misconfigurations
  67. ICO Reprimand: company suffered a ransomware attack
  68. The UK Online Safety Bill becomes an Act (Law)
  69. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  70. Ransomware, extortion and the cyber crime ecosystem
  71. Cyber Resource: The Cyber Resilience Centre Group
  72. Email and Security: ICO recent guidance
  73. Help after a Cyber Attack/Incident
  74. What to do in the event of a Cyber Attack
  75. How KCSIE is linked to Cyber Strategy
  76. Cyber Crime: AI Generated Phishing Attacks
  77. Cyber Attack: Exam Boards
  78. VICE SOCIETY - Ransomware attacks on schools
  79. Using Tags if you are a group of organisations in the DPE Knowledge Bank
  80. Where's Harry the Hacker?
  81. Be Cyber Aware: USB Sticks
  82. Cyber Insurance in the Public Sector
  83. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  84. Cyber Attack: Leytonstone School
  85. Be Cyber Aware: Firewalls
  86. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  87. Cyber Attack: Dorchester School
  88. Knowledge Bank Role Types: Admin, Staff and Trustee
  89. Types of Cyber Attacks: Password Attacks
  90. Be Cyber Aware: Why regular software updates are important
  91. Cyber Attack: Wiltshire School
  92. Keeping your IT systems safe and secure
  93. Why we recommend using PIN codes on printers
  94. Types of Cyber Attacks: DDoS Attacks
  95. Types of Cyber Attacks: Phishing
  96. Redaction Guidelines Updated
  97. Types of Cyber Attacks: The Insider Threat
  98. Why your data is profitable to cyber criminals
  99. Using WhatsApp in Schools
  100. Knowledge Bank Updates
  101. Types of malware and how they are linked to data protection
  102. A guide to multi-factor authentication
  103. Windows Server 2012 & 2012 R2 Retirement
  104. How to contact us for support, subject access requests, data breaches and FOI's
  105. How a school fought back after a cyberattack
  106. Types of Cyber Attacks - Credential Stuffing
  107. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  108. Assigning courses to staff using to-dos
  109. The Education sector now at highest risk of cyber attacks
  110. Cyber Attacks
  111. Best Practice for Managing Photos and Video
  112. Compliance Manager released
  113. Emails – good practice and minimising the risk of a data breach

Search