Be Cyber Aware: Why regular software updates are important

Hackers and cyber criminals are continuously searching for vulnerabilities in software and systems to exploit for their own malicious gains.  

What are Zero-Day Vulnerabilities

Zero-day vulnerabilities refer to software flaws or weaknesses that are unknown to the software vendor and, consequently, unpatched at the time of discovery by cyber criminals.  These vulnerabilities are security holes that malicious threat actors (hackers) can exploit to gain unauthorised acces

Cyber Security Breaches Survey 2023

The Cyber Security Breaches Survey is a research study for UK cyber resilience, aligning with the National Cyber Strategy.

The full report is here: Cyber Security Breaches Survey 2023

There is a separate annex published for education institutions, the full report is here: Cyber Security Breaches Survey 2023 Education Institutions Annex

In Summary, the percentage of organisations that have identified breaches or attacks in the last 12 months:

World Password Day - May 4th

May 4th is World Password Day - it's good to have a day to consider how secure your passwords are and where you store that information.

Intel created World Password Day - the first Thursday of May - to address the critical need for solid passwords.  The day was first celebrated in 2013, and since then it has become an important reminder to take password security seriously.   In a world where technology is increasingly integrated into our daily lives, our passwords serve

Cyber Attack: Wiltshire School

A Wiltshire secondary school has been severely affected by a targeted attack by hackers who demanded a ransom to restore access to its IT network.  The attack affected the school's local server, its website, internet access, Wi-Fi, printers and internal phone systems.

A full report can be read here: https://www.gazetteandherald.co.uk/news/23476464.hacker-demands-ransom-taking-control-wiltshire-schools/

The school's website was still down several days later.  An updat

Keeping your IT systems safe and secure

The ICO recently published an updated article aimed at small business with tips for IT security - this advice would also be applicable for schools and colleges.  

This table shows the advice from the ICO and how areas of the Data Protection Education Knowledge Bank can help and guide you in those areas. 

ICO Recommendation DPE Knowledge Bank Links  Back up your data    Info/Cyber Security Checklist

 How secure is your se

Types of Cyber Attacks: DDoS Attacks

This article explains what a DDoS attack is and how to manage if your organisation is attacked.

A DoS attack is a denial of service attack.  It occurs when users are denied access to computer services or resources, usually by overloading the service with requests.  Your server or your website will be repeatedly bombarded with requests for information or resources.  This overwhelms the system making it unusable and unavailable.

An attack becomes a 'distributed de

Types of Cyber Attacks: Phishing

This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance.

Phishing is a type of cyber attack in which an attacker tries to trick the victim into giving away sensitive

Types of Cyber Attacks: The Insider Threat

This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance.

The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will

Why your data is profitable to cyber criminals

This article covers ways in which cyber criminals profit from their cyber crimes.  Often we might think our data, if it is not financial, is not interesting or profitable to hackers, so this article discusses the different types of data that are stolen and why.

Financial data is the main data type that we all think of when considering why a hacker might steal information.  Financial data can be sold to various individuals for different purposes. It is not uncommon for t

Using WhatsApp in Schools

This article is about the use of WhatsApp as a communication tool in schools and recent vulnerabilities. It discusses school staff using WhatsApp as a communication method for school business.

We are sometimes asked by staff whether it is OK for staff to be in a WhatsApp group for important school messages. Staff often wish to use it because it is an easy way to communicate and a platform that a lot of people are familiar with.  It is also free. There are issues around this:

Types of malware and how they are linked to data protection

Malware is malicious software designed to harm computer systems and is linked to data protection in several ways.

Malware can be used to steal or compromise sensitive data stored on a computer system or network. This data could include personal information, financial data, or confidential business information. In this sense, malware poses a significant threat to data protection, as it can lead to data breaches and other security incidents.

Malware can

Striking Data Breach

The headteacher of a grammar school has left her role after sending parents a list of the teachers going on strike.

The Headteacher at King Edward VI Five Ways Grammar school in Birmingham  had been headmistress for just 18 months when an email she sent to parents is alleged to have named some teachers who would be striking during the planned walkouts last month.

Windows Server 2012 & 2012 R2 Retirement

This article is a reminder that Microsoft will stop support for both Windows Server 2012 and Windows Server 2012 R2 after October 10th 2023.  Keeping software up to date on devices is best practice to help prevent cyber attacks and data breaches.

How to contact us for support, subject access requests, data breaches and FOI's

This article lists the ways that Data Protection Education can be contacted for general data protection queries, data breaches, subject access requests and freedom of information requests.

While all our customers have a dedicated consultant who can be contact directly, if there is an urgent issue we would always advise emailing This email address is being protected from spambots. You need JavaScript enabled to view it..

When you email This email address is being protected from

How a school fought back after a cyberattack

The following article talks about how a school thwarted a cyber attack, more through luck than judgement.  Our advice is for the whole organisation to be cyber aware and review how your organisation might respond when attacked.    The article gives ideas on how to begin making a cyber ready plan.

In October 2020 Kellett School was subject to a ransomware denial-of-service (DoS) attack orchestrated by a Russian criminal hacker group.  After the attack, a post m

Types of Cyber Attacks - Credential Stuffing

This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance

End of Windows 8.1 Support

Given the current financial pressure on schools it is very likely there are devices in schools running out of date software.  This article looks at the most recent version of Windows that support has ended for, what that means and why upgrades are a must. 

Assigning courses to staff using to-dos

To assign courses to your staff, we should use the to-do functionality via the Course Assignment and Progress Report.

When we assign a to-do via this report, and the user completes the course, the to-do will be automatically marked as complete in the to-do list. 

  1. The NCSC 2022 Annual Review - What does this mean for schools?
  2. France Issues Adtech Giant $65 million Fine
  3. Are we Going too Far with Biometric Technology in Schools?
  4. October is #Cybersecurity Month
  5. You Can Still Use Facebook in Europe... For Now: News Roundup
  6. Google Urges Developers to Patch their Apps: Weekly Cyber Update
  7. What the Online Safety Bill Means for Social Media
  8. The Changes Made to the Online Safety Bill
  9. An Introduction to the Online Safety Bill
  10. Google’s Services Deemed Unsafe for Schools
  11. Scammers Pretending to be Family Members: Cyber Update
  12. What Can Happen When a Primary School Aged Child Breaks the Law
  13. Disney Signs New Automated Advertising Deal: News Roundup
  14. Subject Access Requests and Children's Data
  15. The Key to Long Term Sustainable Cyber Security
  16. The End of Public Sector ICO Fines?
  17. Latest Privacy Concerns Surrounding Tiktok
  18. Changes to Cookie Pop Ups
  19. Apps Using Loophole to Track Childrens’ Phones
  20. Lockdowns opened Child Data Privacy Concerns
  21. News Roundup: Mark Zuckerberg Sued for Failing to Protect User Data
  22. Best Interests of the Child Self Assessment
  23. Cyber Threat to Health and Education Sectors
  24. UK Schools Introducing Biometrics Without Due Care
  25. Meet the Robot that Scans Your Entire House
  26. How the Record of Processing Can Help You
  27. WhatsApp Hit by Fake Voice Message Scam
  28. How Schools are Dealing with Cyber Security Breaches
  29. 2022 Security Breach Report Published
  30. Information Security Basics: What are VPN's?
  31. March Cyber Update
  32. What does a Data Protection Officer Do?
  33. Are you ready for a Data Breach?
  34. Information Security Basics: What are Cookies?
  35. Weekly Cyber Update February 8th
  36. Privacy in the Metaverse
  37. Weekly Cyber Update: Fraud, Ransomware and Cyber Essentials
  38. Data Privacy Day
  39. Blog: Best Practice on the Retention of Child Protection Information
  40. Weekly Cyber Update
  41. Carrying out Supplier Due Diligence
  42. The Draft Online Safety Bill
  43. Email and retention periods
  44. The Education sector now at highest risk of cyber attacks
  45. How to Assess your Data Security
  46. EU’s Data Protection Advisor latest to call ban on tracking ads
  47. Lloyd v Google: A Landmark Case
  48. Schools Blocked from Using Facial Recognition Systems
  49. Facebook Deletes User Data
  50. The Government's 'Data: a New Direction'
  51. Sharing this year’s Nativity play online
  52. How Facebook Knows Where You Are Without Knowing Where You Are
  53. The Importance of Schools Staying Protected Against Ransomware
  54. Amazon Ring and Facebook fines
  55. NCSC Weekly Threat Report October 15th
  56. The ICO's New Data Sharing Code
  57. How to Handle a Data Breach
  58. Apple's New Privacy Focused Software
  59. A quick introduction to the Phishing Simulation tool
  60. The Flow of Data Post Brexit
  61. The Children's Code
  62. Recording vaccination of staff
  63. B&H FoI: Racist/religious incidents/bullying
  64. B&H FOI Request: ‘Racial Literacy Training 101’
  65. Cyber Attacks
  66. Brexit update - Adequacy
  67. Protocol for Setting Up and Delivery of Online Teaching and Learning
  68. COVID-19 National Testing Programme: Schools & Colleges handbook
  69. Brexit update
  70. Class Dojo International Data Sharing
  71. Model Publication Scheme: Amendments, Improvements and Updates
  72. Child friendly privacy notices
  73. Transparency
  74. Brexit...what we know so far.
  75. Parents and students covertly recording conversations
  76. Do you need help getting focused?
  77. SAR? ER? FOI?
  78. Encryption backdoors by-design
  79. WisePay Data Breach
  80. Data Protection Education Ltd and GDPRiS Partnership
  81. Secure file transfer of files using Royal Mail
  82. Cyber security alert issued following rising attacks on UK academia
  83. Is it safe for children and teachers to be back to normal in schools?
  84. Quick guide to key contact information: LA and other information
  85. Quick guide to key contact information: Official DfE guidance
  86. Key elements of a successful DPIA
  87. FOI Publication Schemes
  88. Morrisons and Vicarious Liability
  89. SHARE: Avoid disinformation online
  90. Best Practice for Managing Photos and Video
  91. GDPR and Coronavirus
  92. Cybersecurity warning: Coronavirus fraud attacks
  93. How one school is coping with the day to day reality of COVID-I9
  94. Criminals seek to exploit Coronavirus fears
  95. New Drip Feeds: Recognise and Respond to Subject Access Request
  96. When to contact the Data Protection Officer?
  97. National child measurement programme 2019
  98. You thought BA was a large fine?
  99. Make sure DPE is your registered DPO with the ICO
  100. GDPR: One year on
  101. Compliance Manager released
  102. Google hit with €50,000,000 fine
  103. Headteacher fined for breach of data protection legislation
  104. January 2019 Knowledge Bank Update
  105. Passwords – simplifying the approach
  106. Emails – good practice and minimising the risk of a data breach

Search

Keep in the Know!

Enter your details to recive a regular updates and emails from Data Protection Education

Choose
Unsubscribe