The 9ine Blog

9ine helps thousands of school leaders and IT teams protect their stakeholders by publishing critical changes, updates and best practice blogs. 

Subscribe to 9ine's monthly newsletter, 9News to receive monthly blogs delivered right in to your inbox.


SUBSCRIBE TO 9NEWS

New Data Protection Agency to Address Growing Privacy Crisis in the United States

New Data Protection Agency to Address Growing Privacy Crisis in the United States

Last week US Senator Kirsten Gillibrand (D-NY) published a bill which, if passed, would create a US federal data protection agency designed to protect the privacy of Americans and with the authority to enforce data practices across the country. The ...
How to Plan for a Data Breach in Your School Network

How to Plan for a Data Breach in Your School Network

A data breach is a very different type of crisis to others that you may encounter in your school and is likely to occur where a security incident leads to an interference of personal data. A data breach has its own set of common characteristics. ...
Data Protection, IT and Cyber Security Predictions for Schools in 2020

Data Protection, IT and Cyber Security Predictions for Schools in 2020

Technology is transformative. In 2020 schools and universities worldwide are dependent on the IT infrastructure that supports them. As schools embrace mobility, collaboration and cloud services, technology evolves beyond a purely IT consideration to ...
Cyber Security in Schools: Home and Mobile Working

Cyber Security in Schools: Home and Mobile Working

Providing staff with the privilege of access to data when working remotely is standard practice across schools. Staff will often access the school network during a break at a conference facility, while working in a cafe, hotel lobby, or while using ...
Cyber Security in Schools: Event Log Monitoring

Cyber Security in Schools: Event Log Monitoring

In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our previous blog, User Privileges, Passwords and the Human Firewall, we outlined how good user management ...
Cyber Security in Schools: User Privileges, Passwords and the Human Firewall!

Cyber Security in Schools: User Privileges, Passwords and the Human Firewall!

In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how schools can reduce the likelihood and impact of a cyber attack through effective use of user ...
Cyber Compliance Requirements - Academies Financial Handbook 2019

Cyber Compliance Requirements - Academies Financial Handbook 2019

To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and irregularity. Cyber security is specifically referenced by the Education & Skills Funding Agency (ESFA) ...
Cyber Crime & Fraud - What Your Governing Body Needs to Know

Cyber Crime & Fraud - What Your Governing Body Needs to Know

Cyber Security Guidance from the Charity Commission
Cyber Security: Incident Management - Improving Resilience and Supporting School Business Continuity

Cyber Security: Incident Management - Improving Resilience and Supporting School Business Continuity

In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how schools can ensure that with well structured, clearly written incident plans and procedures, ...
Data Protection & CIS International Accreditation Standards

Data Protection & CIS International Accreditation Standards

KEY CHANGES WILL BE IMPLEMENTED THIS YEAR WITHIN CIS’ REVISED INTERNATIONAL ACCREDITATION PROTOCOL Over the past year there have been significant developments to international data protection law. Many of our schools have been confused as to what ...