InfoSec / Cyber

Know your IT Support Provider graphic. IT Support Due Diligence Directory for schools and colleges.

Is your IT Support Provider Compliant?

Finding the right IT partner and support provider is a big decision.  Due diligence for IT Support isn't just about who can 'fix computers', it's about ensuring standards are followed and they work with you to meet your organisation's strategy. Data Protection Education has a DfE IT Support Tracker and Supplier Due Diligence Directory to provide support and guidance as well as tracking your progress.

Read more …

The Government Cyber Action Plan 2026 document. UK public sector cyber security strategy.

The Government Cyber Action Plan

The Government Cyber Action Plan, published in January 2026, sets out a radical shift in how the UK public sector manages cyber security and digital resilience. It moves away from fragmented, siloed defences toward a "Defend as One" model led by a new Government Cyber Unit within the Department for Science, Innovation and Technology (DSIT).

Read more …

 A promotional image for new digital standards in education.  The top half shows four primary school-age children sitting at a desk, looking down and focusing on work. The child closest to the camera on the right is smiling.  The bottom half has an orange and blue graphic overlay that reads: "New standard announced! MEETING DIGITAL STANDARDS IN SCHOOLS AND COLLEGES." In the bottom left corner is a circle image showing students working on laptops. The text "IT Support" is written in a yellow box below the circle. In the bottom right corner is a logo for the "DATA PROTECTION EDUCATION" initiative.

IT Support Standards for Schools and Colleges Guidance (DfE Digital Standards)

The government has announced an additional Digital Standard to help with planning, commissioning and reviewing their IT support services.  The services can be internal, external or a hybrid.  Effective IT support is essential for maintaining technology, planning improvements and mitigating risks like outages and cyber incidents, and sits alongside the other 11 standards.

Read more …

  1. October 31. On the road to improving cyber resilience
  2. October 30. Cyber Support
  3. October 29. Admin Controls & Accounts
  4. October 28. Phishing: Don't Take the Bait!
  5. October 27. Passwords
  6. October 26. Physical Security of Digital Assets
  7. October 25. Server Security: Protecting Your Digital Core
  8. October 24. Backups: Your Recovery Safety Net
  9. October 23. Filtering and Monitoring
  10. October 22. Hardware: Printers
  11. October 21. Hardware: Asset Management
  12. October 20. Hardware: Safe disposal
  13. October 19. Anti-virus/anti-malware
  14. October 18. Regular Updates: Patching Against Threats
  15. October 17. Access Control: Managing User Privileges
  16. October 16. Access Control: Securing Your Digital Gateways (Wi-Fi & Networks)
  17. October 15. Access Control: Securing Your Home Office (Working From Home)
  18. October 14. Access Control : (Multi-factor authentication)
  19. October 13. Cyber Security Awareness
  20. October 12. Training: Empowering your human firewall
  21. October 11. Policies and Procedures: Cyber Blueprint
  22. October 10. Understanding Your Cyber Posture
  23. Time's Ticking: Windows 10 support ends in October 2025!
  24. October 9. A Guide for Education Providers
  25. October 8. How Can Your Organisation Prevent Ransomware Attacks?
  26. October 7: Under Attack: The Reality of Ransomware
  27. October 6: Cyber Action Plan and A Roadmap to Resilience
  28. October 5: Cyber Responsibilities - We're All in This Together
  29. October 4: When a Cyber Attack Hits
  30. October 3: Data Security, the Core of Protection
  31. October 2: Privacy Protection & Safeguarding Personal Data
  32. October 1: Welcome to Cyber Security Awareness Month!
  33. Nursery Cyber attack
  34. The NCSC Cyber Assessment Framework
  35. The Classroom's Dark Side: Cyber crime from the Classroom
  36. The Latest Cyber Threat: The "Murky Panda"
  37. Social engineering + impersonation = Fraud ≡ cyber deception
  38. School cyber attack: Framlingham College, Suffolk
  39. Getting caught in the Scattered Spider web
  40. A Wake-Up Call for Cyber Vigilance - Danger in the Threat Landscape for Everyone
  41. Apple removes its highest level data security tool from UK customers
  42. The role of Passkeys in Cyber Resilience and Cyber Security
  43. Effectively communicating during a cyber incident
  44. Safeguarding Identity in Microsoft 365: Protecting the UK Education Sector Against Cyber Threats
  45. How does the recent global IT outage affect me?
  46. King's speech introduces new bills in relation to cyber security, smart data and digital information
  47. What's a Cyber Incident and what should we do?
  48. Free short cyber training for staff
  49. Children's mental health data leaked after a cyber attack
  50. Cyber Incident Review: The Benefits
  51. Cyber attack on a University
  52. Kent Councils Data Breach
  53. Phishing attacks targeting schools - alert from City of London Police
  54. Update on Advisory for Rhysida Ransomware
  55. The Crime in a Cyber Attack and a Data Breach
  56. NCSC Annual Review is published for 2023
  57. Learning from Data Breaches
  58. Windows 11 security ineffective against attacks on old devices
  59. International Counter Ransomware Initiative 2023 Joint Statement
  60. Top Ten Cyber Security Misconfigurations
  61. ICO Reprimand: company suffered a ransomware attack
  62. The UK Online Safety Bill becomes an Act (Law)
  63. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  64. Ransomware, extortion and the cyber crime ecosystem
  65. Cyber Resource: The Cyber Resilience Centre Group
  66. Email and Security: ICO recent guidance
  67. What to do in the event of a Cyber Attack
  68. Cyber Crime: AI Generated Phishing Attacks
  69. Cyber Attack: Exam Boards
  70. VICE SOCIETY - Ransomware attacks on schools
  71. Be Cyber Aware: USB Sticks
  72. Cyber Insurance in the Public Sector
  73. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  74. Cyber Attack: Leytonstone School
  75. Be Cyber Aware: Firewalls
  76. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  77. Cyber Attack: Dorchester School
  78. Types of Cyber Attacks: Password Attacks
  79. Be Cyber Aware: Why regular software updates are important
  80. Cyber Attack: Wiltshire School
  81. Keeping your IT systems safe and secure
  82. Why we recommend using PIN codes on printers
  83. Types of Cyber Attacks: DDoS Attacks
  84. Types of Cyber Attacks: Phishing
  85. Types of Cyber Attacks: The Insider Threat
  86. Why your data is profitable to cyber criminals
  87. Types of malware and how they are linked to data protection
  88. How a school fought back after a cyberattack
  89. Types of Cyber Attacks - Credential Stuffing
  90. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  91. The Education sector now at highest risk of cyber attacks
  92. Cyber Attacks
  93. Emails – good practice and minimising the risk of a data breach

Search