Feedback

Simfin

esafety and digital citizenship specialist

 Tagged with esecurity


15 May 2017

Reducing The Impact

This is a National Cyber Security Resource

Most cyber attacks are composed of four stages: Survey, Delivery, Breach and Affect. The following security controls, applied at each stage of an attack, can reduce your organisation’s exposure to a successful cyber attack.

Read more

13 June 2016

'No, you can’t win tickets for Radio 1’s Big Weekend festival by liking a Facebook page. It’s not true that there are free business-class flights being given away by Qantas Air. And no, TV show Total Wipeout isn’t bringing a tour to your local city. But all three are recent examples of convincing scams on Facebook where fraudsters pretending to be trusted brands have mocked up pages in search of likes, comments, shares and more from unwitting users.'

 

Read more 

08 June 2016

With vast swathes of data being sold on the dark web in recent weeks following high-profile breaches, many sites are encouraging users to change their passwords, even if they weren't directly affected.

Facebook and Netflix appear to be taking this a step further with reports a number of users are being forced to update their credentials.

 

Read more here

12 March 2015

 This document, by the NEN, is intended for school senior leadership teams and provides an overview of what needs to be in place to keep school networks secure.

The 10 steps described here are adapted from the 2012 CESG document 10 Steps to Cyber Security. CESG is the information security arm of Government Communications Headquarters (GCHQ).

Make sure you understand where the responsibilities for maintaining all these systems and processes reside: some may be maintained in-house while others may be provided by your broadband supplier or another third party.

 

Read more

10 March 2015

This is an advice and information document issued by the Department for Education. The advice is non-statutory, and has been produced to help recipients understand some of

the key principles and their obligations and duties in relation to the Data Protection Act 1998 (the DPA), particularly when considering moving some or all of their software services to internet-based "cloud" service provision.

Download here