Photo of a computer network and lots of spiders on a white background.  Black text: The Scattered Spider Web. Data Protection Education DPO badge

Getting caught in the Scattered Spider web

🛡️🕷️ The Scattered Spider is a fast-growing group of cyber attackers currently on the attack and possibly attributed to the recent attack on M & S - they don't just break in and grab one thing, they like to cause as much chaos as possible and then ask for a ransom.

Read more …

Photo of a cat with leopard markings laying down on a white background underneath black text: Password Day, we suggest not using your pet's name for passwords! Data Protection Education DPO badge

World Password Day

🔒 It's World Password Day - a reminder to check how secure your passwords are and where you store that information.  There's a lot of password help and advice out there which can be confusing.  We highlight the basic things you need to be thinking about.

Read more …

AI generated image of a key hole overlayed by a finger print on a cyber background. Data protection education logo on the bottom right of the image

The role of Passkeys in Cyber Resilience and Cyber Security

🗝️🛡️ In a world where cyber attacks are becoming increasingly sophisticated, protecting sensitive information and user accounts has never been more critical. Traditional passwords are rapidly being replaced by a more advanced and secure solution: passkeys. This article explores the benefits of passkeys, their role in preventing cyber attacks, and what to do if a system does not yet support them.

Read more …

 A lady with a head in her hands with computer screens around her.  A cyber incident response plan text.  communication planning. data protection education logo

Effectively communicating during a cyber incident

📢 It's important to be prepared for when a cyber incident happens to you.  Part of that preparation should include having a Cyber Incident Response Plan, and part of that plan should include how to communicate, who does the communication and what they should say.

Read more …

  1. October is Cyber Security Awareness Month: 23. Filtering and Monitoring
  2. October is Cyber Security Awareness Month: 22. Hardware: Printers
  3. October is Cyber Security Awareness Month: 21. Hardware: Asset Control
  4. October is Cyber Security Awareness Month: 20. Hardware: Safe disposal
  5. October is Cyber Security Awareness Month: 19. Anti-virus/anti-malware
  6. October is Cyber Security Awareness Month: 18. Regular Updates
  7. October is Cyber Security Awareness Month: 17. Access Control (Users)
  8. October is Cyber Security Awareness Month: 16. Access Control (Wi-Fi/Network access)
  9. October is Cyber Security Awareness Month: 15. Access Control (working from home/off site)
  10. October is Cyber Security Awareness Month: 14. Access Control (MFA)
  11. October is Cyber Security Awareness Month: 13. Awareness
  12. October is Cyber Security Awareness Month: 12. Training
  13. October is Cyber Security Awareness Month: 11. Policies and Procedures
  14. October is Cyber Security Awareness Month: 10. Assess where you are with cyber security
  15. October is Cyber Security Awareness Month: 9. A guide for education providers
  16. October is Cyber Security Awareness Month: 8. How can your organisation prevent Ransomware attacks?
  17. October is Cyber Security Awareness Month: 7. What does a Ransomware attack on a school look like?
  18. October is Cyber Security Awareness Month: 6. Cyber Action Plan
  19. October is Cyber Security Awareness Month: 5. Responsibilities
  20. October is Cyber Security Awareness Month: 4. What to do in a cyber attack
  21. October is Cyber Security Awareness Month: 3. Data Security
  22. October is Cyber Security Awareness Month: 2. Privacy Protection
  23. October is Cyber Security Awareness Month: 1. Why is cyber security important?
  24. How does the recent global IT outage affect me?
  25. King's speech introduces new bills in relation to cyber security, smart data and digital information
  26. What's a Cyber Incident and what should we do?
  27. Free short cyber training for staff
  28. Children's mental health data leaked after a cyber attack
  29. Cyber Security Breaches Survey 2024 (Education Institutions)
  30. Cyber Security Breaches Survey 2024 (Businesses and Charities)
  31. Cyber Incident Review: The Benefits
  32. Cyber attack on a University
  33. Major cyber-criminal gang Lockbit brought down by UK Law Enforcement
  34. Safer Internet Day 2024
  35. Kent Councils Data Breach
  36. Phishing attacks targeting schools - alert from City of London Police
  37. Update on Advisory for Rhysida Ransomware
  38. The Crime in a Cyber Attack and a Data Breach
  39. NCSC Annual Review is published for 2023
  40. Learning from Data Breaches
  41. Windows 11 security ineffective against attacks on old devices
  42. International Counter Ransomware Initiative 2023 Joint Statement
  43. Resistant Cloud Backups
  44. Top Ten Cyber Security Misconfigurations
  45. ICO Reprimand: company suffered a ransomware attack
  46. The UK Online Safety Bill becomes an Act (Law)
  47. The importance of software updates (PaperCut vulnerability and Rhysida ransomware)
  48. Ransomware, extortion and the cyber crime ecosystem
  49. Schools under Cyber Attack: September 2023
  50. Cyber Resource: The Cyber Resilience Centre Group
  51. Email and Security: ICO recent guidance
  52. What to do in the event of a Cyber Attack
  53. Cyber Crime: AI Generated Phishing Attacks
  54. Cyber Attack: Exam Boards
  55. VICE SOCIETY - Ransomware attacks on schools
  56. Be Cyber Aware: USB Sticks
  57. Cyber Insurance in the Public Sector
  58. Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
  59. Cyber Attack: Manchester University
  60. Cyber Attack: Leytonstone School
  61. Be Cyber Aware: Firewalls
  62. Be Cyber Aware: Cyber attacks and transparency. A no blame culture
  63. Cyber Attack: Dorchester School
  64. Types of Cyber Attacks: Password Attacks
  65. Be Cyber Aware: Why regular software updates are important
  66. Cyber Security Breaches Survey 2023
  67. Cyber Attack: Wiltshire School
  68. Keeping your IT systems safe and secure
  69. Types of Cyber Attacks: DDoS Attacks
  70. Types of Cyber Attacks: Phishing
  71. Types of Cyber Attacks: The Insider Threat
  72. Why your data is profitable to cyber criminals
  73. Types of malware and how they are linked to data protection
  74. How a school fought back after a cyberattack
  75. Types of Cyber Attacks - Credential Stuffing
  76. January Cyber update - How Can Schools Help Prevent Cyber Attacks?
  77. End of Windows 8.1 Support
  78. Information Security Basics: What are VPN's?
  79. The Education sector now at highest risk of cyber attacks
  80. How to Assess your Data Security
  81. Cyber Attacks
  82. Emails – good practice and minimising the risk of a data breach

Search