What is the right of access? Commonly referred to as a subject access request (SAR), gives someone the right to obtain a copy of their personal information from your organisation.
Do people have to submit a
Malicious threat actors (hackers) are always developing new techniques to breach passwords. This article lists the different types of password attacks and some defences/counter-measures which can be used to enhance password security. In our experience, hackers are most successful at accessing school systems unlawfully using these methods. Passwords continue to be a primary target for cyber criminals seeking unauthorised access to accounts.
Password security is a
Hackers and cyber criminals are continuously searching for vulnerabilities in software and systems to exploit for their own malicious gains.
What are Zero-Day VulnerabilitiesZero-day vulnerabilities refer to software flaws or weaknesses that are unknown to the software vendor and, consequently, unpatched at the time of discovery by cyber criminals. These vulnerabilities are security holes that malicious threat actors (hackers) can exploit to gain unauthorised acces
The Cyber Security Breaches Survey is a research study for UK cyber resilience, aligning with the National Cyber Strategy.
The full report is here: Cyber Security Breaches Survey 2023
There is a separate annex published for education institutions, the full report is here: Cyber Security Breaches Survey 2023 Education Institutions Annex
In Summary, the percentage of organisations that have identified breaches or attacks in the last 12 months:
A Wiltshire secondary school has been severely affected by a targeted attack by hackers who demanded a ransom to restore access to its IT network. The attack affected the school's local server, its website, internet access, Wi-Fi, printers and internal phone systems.
A full report can be read here: https://www.gazetteandherald.co.uk/news/23476464.hacker-demands-ransom-taking-control-wiltshire-schools/
The school's website was still down several days later. An updat
The ICO recently published an updated article aimed at small business with tips for IT security - this advice would also be applicable for schools and colleges.
This table shows the advice from the ICO and how areas of the Data Protection Education Knowledge Bank can help and guide you in those areas.
ICO Recommendation DPE Knowledge Bank Links Back up your data Info/Cyber Security ChecklistHow secure is your se
This article explains what a DDoS attack is and how to manage if your organisation is attacked.
A DoS attack is a denial of service attack. It occurs when users are denied access to computer services or resources, usually by overloading the service with requests. Your server or your website will be repeatedly bombarded with requests for information or resources. This overwhelms the system making it unusable and unavailable.
An attack becomes a 'distributed de
This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance.
Phishing is a type of cyber attack in which an attacker tries to trick the victim into giving away sensitive
This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance.
The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will
This article covers ways in which cyber criminals profit from their cyber crimes. Often we might think our data, if it is not financial, is not interesting or profitable to hackers, so this article discusses the different types of data that are stolen and why.
Financial data is the main data type that we all think of when considering why a hacker might steal information. Financial data can be sold to various individuals for different purposes. It is not uncommon for t
This article is about the use of WhatsApp as a communication tool in schools and recent vulnerabilities. It discusses school staff using WhatsApp as a communication method for school business.
We are sometimes asked by staff whether it is OK for staff to be in a WhatsApp group for important school messages. Staff often wish to use it because it is an easy way to communicate and a platform that a lot of people are familiar with. It is also free. There are issues around this:
On July 18, 2022, the U.K. government introduced the Data Protection and Digital Information Bill to Parliament. Previously known as the Data Reform Bill, it is the result of a consultation from 2021 and its aim is to update and simplify the U.K.’s data protection framework. According to the U.K. government, the new legal framework created by the DPDI Bill will reduce burdens on organizations while maintaining high data protection standards.