4 min read
Cyber Security in Schools: Event Log Monitoring
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
4 min read
In this seventh blog in the series which builds upon every stage of the NCSC's 10 Steps to Cyber Security, we look at Event Log Monitoring. In our...
3 min read
In this sixth blog in the series we look at User Privileges, following the guidance from the UK National Cyber Security Centre (NCSC). We explore how...
2 min read
To comply with section 6.9 - 6.12 of the Academies Financial Handbook, Multi-Academy Trusts (MATs) must be aware of the risk of fraud, theft and...
3 min read
Cyber Security Guidance from the Charity Commission
3 min read
In this fifth blog in the series, we look at Incident Management, following the guidance from the UK National Cyber Security Centre (NCSC). We...
3 min read
Whichever sector you operate in, new data protection law makes it a legal requirement that you assess the risks to your IT systems and services. Your...